[WARNING]: Collection infra.leapp does not support Ansible version 2.14.18 [WARNING]: running playbook inside collection infra.leapp ansible-playbook [core 2.14.18] config file = /etc/ansible/ansible.cfg configured module search path = ['/root/.ansible/plugins/modules', '/usr/share/ansible/plugins/modules'] ansible python module location = /usr/lib/python3.9/site-packages/ansible ansible collection location = /root/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible-playbook python version = 3.9.23 (main, Aug 19 2025, 00:00:00) [GCC 11.5.0 20240719 (Red Hat 11.5.0-11)] (/usr/bin/python3) jinja version = 3.1.2 libyaml = True Using /etc/ansible/ansible.cfg as config file Skipping callback 'default', as we already have a stdout callback. Skipping callback 'minimal', as we already have a stdout callback. Skipping callback 'oneline', as we already have a stdout callback. PLAYBOOK: tests_upgrade_custom_7to8.yml **************************************** 1 plays in /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_upgrade_custom_7to8.yml PLAY [Test RHEL 7 to 8 Custom Repository Upgrade] ****************************** TASK [Gathering Facts] ********************************************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_upgrade_custom_7to8.yml:2 ok: [managed-node01] TASK [Check if leapp upgrade log exists] *************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_upgrade_custom_7to8.yml:31 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [Skip test if not RHEL 7 or already upgraded] ***************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_upgrade_custom_7to8.yml:36 META: end_play conditional evaluated to False, continuing play skipping: [managed-node01] => {"msg": "end_play", "skip_reason": "end_play conditional evaluated to False, continuing play"} TASK [Include common upgrade tasks] ******************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_upgrade_custom_7to8.yml:44 included: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml for managed-node01 TASK [common_upgrade_tasks | Run first analysis] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:4 [WARNING]: Collection community.general does not support Ansible version 2.14.18 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 changed: [managed-node01] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:21 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "8f20155a9e12b6dd86656e5e1fd4d6f91b1f5637", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "5e290dc9b9de9b0ab788bfc9cc97e658", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1763069697.2641752-6194-281087798305080/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:33 changed: [managed-node01] => {"changed": true, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:41 changed: [managed-node01] => {"changed": true, "checksum": "40eb5afb1d7d22515dc739978336696eddc582de", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "md5sum": "a0fd0cd51602f3110134486c23e213dc", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 12002, "src": "/root/.ansible/tmp/ansible-tmp-1763069698.4923146-6281-114013013782185/source", "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:49 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.378836", "end": "2025-11-13 16:34:59.779355", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:34:59.400519", "stderr": "", "stderr_lines": [], "stdout": "epel-release-7-14.noarch\ntps-devel-2.44.50-1.noarch", "stdout_lines": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:63 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:67 changed: [managed-node01] => {"changed": true, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "md5sum": "a7d4e8abcc28ebc36ca5401fee060144", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:etc_t:s0", "size": 58, "src": "/root/.ansible/tmp/ansible-tmp-1763069699.8873239-6422-68292750845448/source", "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [infra.leapp.analysis : analysis-leapp | Register to leapp activation key] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:14 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 changed: [managed-node01] => (item={'name': 'rhel-7-server-extras-rpms', 'description': 'RHEL 7 Server Extras', 'baseurl': 'https://download.eng.brq.redhat.com/rhel-7/nightly/EXTRAS-7/latest-EXTRAS-7.9-RHEL-7/compose/Server/x86_64/os/', 'file': 'rhel7_extras', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "https://download.eng.brq.redhat.com/rhel-7/nightly/EXTRAS-7/latest-EXTRAS-7.9-RHEL-7/compose/Server/x86_64/os/", "description": "RHEL 7 Server Extras", "file": "rhel7_extras", "name": "rhel-7-server-extras-rpms", "state": "present"}, "repo": "rhel-7-server-extras-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:22 changed: [managed-node01] => {"changed": true, "changes": {"installed": ["leapp-upgrade"], "updated": []}, "msg": "", "rc": 0, "results": ["Loaded plugins: search-disabled-repos\nResolving Dependencies\n--> Running transaction check\n---> Package leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 will be installed\n--> Processing Dependency: leapp-repository-dependencies = 10 for package: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch\n--> Processing Dependency: leapp-framework >= 5.0 for package: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch\n--> Processing Dependency: python2-leapp for package: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch\n--> Processing Dependency: leapp for package: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch\n--> Running transaction check\n---> Package leapp.noarch 0:0.17.0-2.el7_9 will be installed\n---> Package leapp-upgrade-el7toel8-deps.noarch 0:0.20.0-9.el7_9 will be installed\n--> Processing Dependency: dnf >= 4 for package: leapp-upgrade-el7toel8-deps-0.20.0-9.el7_9.noarch\n---> Package python2-leapp.noarch 0:0.17.0-2.el7_9 will be installed\n--> Processing Dependency: leapp-framework-dependencies = 5 for package: python2-leapp-0.17.0-2.el7_9.noarch\n--> Running transaction check\n---> Package dnf.noarch 0:4.0.9.2-2.el7_9 will be installed\n--> Processing Dependency: python2-dnf = 4.0.9.2-2.el7_9 for package: dnf-4.0.9.2-2.el7_9.noarch\n---> Package leapp-deps.noarch 0:0.17.0-2.el7_9 will be installed\n--> Running transaction check\n---> Package python2-dnf.noarch 0:4.0.9.2-2.el7_9 will be installed\n--> Processing Dependency: dnf-data = 4.0.9.2-2.el7_9 for package: python2-dnf-4.0.9.2-2.el7_9.noarch\n--> Processing Dependency: python2-libdnf >= 0.22.5 for package: python2-dnf-4.0.9.2-2.el7_9.noarch\n--> Processing Dependency: python2-libcomps >= 0.1.8 for package: python2-dnf-4.0.9.2-2.el7_9.noarch\n--> Processing Dependency: python2-hawkey >= 0.22.5 for package: python2-dnf-4.0.9.2-2.el7_9.noarch\n--> Processing Dependency: libmodulemd >= 1.4.0 for package: python2-dnf-4.0.9.2-2.el7_9.noarch\n--> Processing Dependency: python2-libdnf for package: python2-dnf-4.0.9.2-2.el7_9.noarch\n--> Running transaction check\n---> Package dnf-data.noarch 0:4.0.9.2-2.el7_9 will be installed\n--> Processing Dependency: libreport-filesystem for package: dnf-data-4.0.9.2-2.el7_9.noarch\n---> Package libmodulemd.x86_64 0:1.6.3-1.el7 will be installed\n---> Package python2-hawkey.x86_64 0:0.22.5-2.el7_9 will be installed\n--> Processing Dependency: libdnf(x86-64) = 0.22.5-2.el7_9 for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n--> Processing Dependency: libsolvext.so.0(SOLV_1.0)(64bit) for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n--> Processing Dependency: libsolv.so.0(SOLV_1.0)(64bit) for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n--> Processing Dependency: libsolvext.so.0()(64bit) for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n--> Processing Dependency: libsolv.so.0()(64bit) for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n--> Processing Dependency: librhsm.so.0()(64bit) for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n--> Processing Dependency: librepo.so.0()(64bit) for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n--> Processing Dependency: libjson-glib-1.0.so.0()(64bit) for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n--> Processing Dependency: libdnf.so.2()(64bit) for package: python2-hawkey-0.22.5-2.el7_9.x86_64\n---> Package python2-libcomps.x86_64 0:0.1.8-14.el7 will be installed\n--> Processing Dependency: libcomps(x86-64) = 0.1.8-14.el7 for package: python2-libcomps-0.1.8-14.el7.x86_64\n--> Processing Dependency: libcomps.so.0.1.6()(64bit) for package: python2-libcomps-0.1.8-14.el7.x86_64\n---> Package python2-libdnf.x86_64 0:0.22.5-2.el7_9 will be installed\n--> Running transaction check\n---> Package json-glib.x86_64 0:1.4.2-2.el7 will be installed\n---> Package libcomps.x86_64 0:0.1.8-14.el7 will be installed\n---> Package libdnf.x86_64 0:0.22.5-2.el7_9 will be installed\n---> Package librepo.x86_64 0:1.8.1-8.el7_9 will be installed\n---> Package libreport-filesystem.x86_64 0:2.1.11-53.el7 will be installed\n---> Package librhsm.x86_64 0:0.0.3-3.el7_9 will be installed\n---> Package libsolv.x86_64 0:0.6.34-4.el7 will be installed\n--> Finished Dependency Resolution\n\nDependencies Resolved\n\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n leapp-upgrade-el7toel8 noarch 0.20.0-9.el7_9 rhel-7-server-extras-rpms 1.2 M\nInstalling for dependencies:\n dnf noarch 4.0.9.2-2.el7_9 rhel-7-server-extras-rpms 357 k\n dnf-data noarch 4.0.9.2-2.el7_9 rhel-7-server-extras-rpms 51 k\n json-glib x86_64 1.4.2-2.el7 rhel-Server 134 k\n leapp noarch 0.17.0-2.el7_9 rhel-7-server-extras-rpms 29 k\n leapp-deps noarch 0.17.0-2.el7_9 rhel-7-server-extras-rpms 12 k\n leapp-upgrade-el7toel8-deps\n noarch 0.20.0-9.el7_9 rhel-7-server-extras-rpms 37 k\n libcomps x86_64 0.1.8-14.el7 rhel-7-server-extras-rpms 75 k\n libdnf x86_64 0.22.5-2.el7_9 rhel-7-server-extras-rpms 536 k\n libmodulemd x86_64 1.6.3-1.el7 rhel-7-server-extras-rpms 153 k\n librepo x86_64 1.8.1-8.el7_9 rhel-Server 82 k\n libreport-filesystem x86_64 2.1.11-53.el7 rhel-Server 41 k\n librhsm x86_64 0.0.3-3.el7_9 rhel-7-server-extras-rpms 28 k\n libsolv x86_64 0.6.34-4.el7 rhel-Server 329 k\n python2-dnf noarch 4.0.9.2-2.el7_9 rhel-7-server-extras-rpms 414 k\n python2-hawkey x86_64 0.22.5-2.el7_9 rhel-7-server-extras-rpms 71 k\n python2-leapp noarch 0.17.0-2.el7_9 rhel-7-server-extras-rpms 178 k\n python2-libcomps x86_64 0.1.8-14.el7 rhel-7-server-extras-rpms 47 k\n python2-libdnf x86_64 0.22.5-2.el7_9 rhel-7-server-extras-rpms 611 k\n\nTransaction Summary\n================================================================================\nInstall 1 Package (+18 Dependent packages)\n\nTotal download size: 4.3 M\nInstalled size: 21 M\nDownloading packages:\n--------------------------------------------------------------------------------\nTotal 1.2 MB/s | 4.3 MB 00:03 \nRunning transaction check\nRunning transaction test\nTransaction test succeeded\nRunning transaction\n Installing : json-glib-1.4.2-2.el7.x86_64 1/19 \n Installing : libmodulemd-1.6.3-1.el7.x86_64 2/19 \n Installing : librhsm-0.0.3-3.el7_9.x86_64 3/19 \n Installing : librepo-1.8.1-8.el7_9.x86_64 4/19 \n Installing : libsolv-0.6.34-4.el7.x86_64 5/19 \n Installing : libdnf-0.22.5-2.el7_9.x86_64 6/19 \n Installing : python2-libdnf-0.22.5-2.el7_9.x86_64 7/19 \n Installing : python2-hawkey-0.22.5-2.el7_9.x86_64 8/19 \n Installing : leapp-deps-0.17.0-2.el7_9.noarch 9/19 \n Installing : python2-leapp-0.17.0-2.el7_9.noarch 10/19 \n Installing : libcomps-0.1.8-14.el7.x86_64 11/19 \n Installing : python2-libcomps-0.1.8-14.el7.x86_64 12/19 \n Installing : libreport-filesystem-2.1.11-53.el7.x86_64 13/19 \n Installing : dnf-data-4.0.9.2-2.el7_9.noarch 14/19 \n Installing : python2-dnf-4.0.9.2-2.el7_9.noarch 15/19 \n Installing : dnf-4.0.9.2-2.el7_9.noarch 16/19 \n Installing : leapp-upgrade-el7toel8-deps-0.20.0-9.el7_9.noarch 17/19 \n Installing : leapp-0.17.0-2.el7_9.noarch 18/19 \n Installing : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 19/19 \n Verifying : libsolv-0.6.34-4.el7.x86_64 1/19 \n Verifying : librepo-1.8.1-8.el7_9.x86_64 2/19 \n Verifying : python2-libcomps-0.1.8-14.el7.x86_64 3/19 \n Verifying : dnf-4.0.9.2-2.el7_9.noarch 4/19 \n Verifying : leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch 5/19 \n Verifying : libdnf-0.22.5-2.el7_9.x86_64 6/19 \n Verifying : librhsm-0.0.3-3.el7_9.x86_64 7/19 \n Verifying : python2-leapp-0.17.0-2.el7_9.noarch 8/19 \n Verifying : python2-hawkey-0.22.5-2.el7_9.x86_64 9/19 \n Verifying : libmodulemd-1.6.3-1.el7.x86_64 10/19 \n Verifying : dnf-data-4.0.9.2-2.el7_9.noarch 11/19 \n Verifying : libreport-filesystem-2.1.11-53.el7.x86_64 12/19 \n Verifying : leapp-0.17.0-2.el7_9.noarch 13/19 \n Verifying : python2-dnf-4.0.9.2-2.el7_9.noarch 14/19 \n Verifying : leapp-upgrade-el7toel8-deps-0.20.0-9.el7_9.noarch 15/19 \n Verifying : json-glib-1.4.2-2.el7.x86_64 16/19 \n Verifying : python2-libdnf-0.22.5-2.el7_9.x86_64 17/19 \n Verifying : libcomps-0.1.8-14.el7.x86_64 18/19 \n Verifying : leapp-deps-0.17.0-2.el7_9.noarch 19/19 \n\nInstalled:\n leapp-upgrade-el7toel8.noarch 0:0.20.0-9.el7_9 \n\nDependency Installed:\n dnf.noarch 0:4.0.9.2-2.el7_9 \n dnf-data.noarch 0:4.0.9.2-2.el7_9 \n json-glib.x86_64 0:1.4.2-2.el7 \n leapp.noarch 0:0.17.0-2.el7_9 \n leapp-deps.noarch 0:0.17.0-2.el7_9 \n leapp-upgrade-el7toel8-deps.noarch 0:0.20.0-9.el7_9 \n libcomps.x86_64 0:0.1.8-14.el7 \n libdnf.x86_64 0:0.22.5-2.el7_9 \n libmodulemd.x86_64 0:1.6.3-1.el7 \n librepo.x86_64 0:1.8.1-8.el7_9 \n libreport-filesystem.x86_64 0:2.1.11-53.el7 \n librhsm.x86_64 0:0.0.3-3.el7_9 \n libsolv.x86_64 0:0.6.34-4.el7 \n python2-dnf.noarch 0:4.0.9.2-2.el7_9 \n python2-hawkey.x86_64 0:0.22.5-2.el7_9 \n python2-leapp.noarch 0:0.17.0-2.el7_9 \n python2-libcomps.x86_64 0:0.1.8-14.el7 \n python2-libdnf.x86_64 0:0.22.5-2.el7_9 \n\nComplete!\n"]} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:29 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:36 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:43 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 6, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:51 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1763069712.3076718-6724-229148528971375/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:60 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 ok: [managed-node01] => {"changed": false, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 changed: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': 'http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/', 'file': '/etc/leapp/files/leapp_upgrade_repositories', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/", "description": "BaseOS for x86_64", "file": "/etc/leapp/files/leapp_upgrade_repositories", "name": "rhel-8-for-x86_64-baseos-rpms", "state": "present"}, "repo": "rhel-8-for-x86_64-baseos-rpms", "state": "present"} changed: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': 'http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/', 'file': '/etc/leapp/files/leapp_upgrade_repositories', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/", "description": "AppStream for x86_64", "file": "/etc/leapp/files/leapp_upgrade_repositories", "name": "rhel-8-for-x86_64-appstream-rpms", "state": "present"}, "repo": "rhel-8-for-x86_64-appstream-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:71 ASYNC POLL on managed-node01: jid=j175707545213.5217 started=1 finished=0 ASYNC FAILED on managed-node01: jid=j175707545213.5217 changed: [managed-node01] => {"ansible_job_id": "j175707545213.5217", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:01:02.719580", "end": "2025-11-13 16:36:16.872778", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j175707545213.5217", "start": "2025-11-13 16:35:14.153198", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * authselect_scanner\n Detect what authselect configuration should be suggested to administrator.\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * common_leapp_dracut_modules\n Influences the generation of the initram disk\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * scanmemory\n Scan Memory of the machine.\n====> * pam_modules_scanner\n Scan the pam directory for services and modules used in them\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * scan_kernel_cmdline\n No documentation has been provided for the scan_kernel_cmdline actor.\n====> * scan_grub_device_partition_layout\n Scan all identified GRUB devices for their partition layout.\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * tcp_wrappers_config_read\n Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * scancpu\n Scan CPUs of the machine.\n====> * removed_pam_modules_scanner\n Scan PAM configuration for modules that are not available in RHEL-8.\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * register_yum_adjustment\n Registers a workaround which will adjust the yum directories during the upgrade.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * storage_scanner\n Provides data about storage settings.\n====> * source_boot_loader_scanner\n Scans the boot loader configuration on the source system.\n====> * check_grub_legacy\n Check whether GRUB Legacy is installed in the MBR.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL8 and report them in model.\n====> * firewalld_facts_actor\n Provide data about firewalld\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * system_facts\n Provides data about many facts from system.\n====> * check_kde_apps\n Actor checks which KDE apps are installed.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & unsigned RPM packages.\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * multipath_conf_read\n Read multipath configuration files and extract the necessary information\n====> * vsftpd_config_read\n Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * satellite_upgrade_facts\n Report which Satellite packages require updates and how to handle PostgreSQL data\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * quagga_daemons\n Active quagga daemons check.\n====> * cups_scanner\n Gather facts about CUPS features which needs to be migrated\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * sctp_read_status\n Determines whether or not the SCTP kernel module might be wanted.\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * spamassassin_config_read\n Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used by Upgrade process.\n==> Processing phase `Checks`\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * sssd_check\n Check SSSD configuration for changes in RHEL8 and report them.\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * vsftpd_config_check\n Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * tcp_wrappers_check\n Check the list of packages previously compiled with TCP wrappers support\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * checkgrep\n Check if Grep is installed. If yes, write information about non-compatible changes.\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * satellite_upgrade_check\n Check state of Satellite system before upgrade\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * checkirssi\n Check if irssi is installed. If yes, write information about non-compatible changes.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * open_ssh_protocol\n Protocol configuration option was removed.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_postfix\n Check if postfix is installed, check whether configuration update is needed.\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * multipath_conf_check\n Checks whether the multipath configuration can be updated to RHEL-8 and\n====> * check_bind\n Actor parsing BIND configuration and checking for known issues in it.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * check_kde_gnome\n Checks whether KDE is installed\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * enable_device_cio_free_service\n Enables device_cio_free.service systemd service on s390x\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * checkfstabxfsoptions\n Check the FSTAB file for the deprecated / removed XFS mount options.\n====> * check_first_partition_offset\n Check whether the first partition starts at the offset >=1MiB.\n====> * removed_pam_modules\n Check for modules that are not available in RHEL 8 anymore\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * checkdosfstools\n Check if dosfstools is installed. If yes, write information about non-compatible changes.\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * check_sendmail\n Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * open_ssh_deprecated_directives_check\n Check for any deprecated directives in the OpenSSH configuration.\n====> * checkhybridimage\n Check if the system is using Azure hybrid image.\n====> * check_docker\n Checks if Docker is installed and warns about its deprecation in RHEL8.\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * authselect_check\n Confirm suggested authselect call from AuthselectScanner.\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * check_removed_envvars\n Check for usage of removed environment variables and inhibit the upgrade\n====> * check_installed_devel_kernels\n Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * check_memcached\n Check for incompatible changes in memcached configuration.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * check_firewalld\n Check for certain firewalld configuration that may prevent an upgrade.\n====> * powertop\n Check if PowerTOP is installed. If yes, write information about non-compatible changes.\n====> * check_brltty\n Check if brltty is installed, check whether configuration update is needed.\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * python_inform_user\n This actor informs the user of differences in Python version and support in RHEL 8.\n====> * open_ssh_algorithms\n OpenSSH configuration does not contain any unsupported cryptographic algorithms.\n====> * check_installed_debug_kernels\n Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * check_chrony\n Check for incompatible changes in chrony configuration.\n====> * removed_pam_modules_check\n Check if it is all right to disable PAM modules that are not in RHEL-8.\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * spamassassin_config_check\n Reports changes in spamassassin between RHEL-7 and RHEL-8\n====> * check_wireshark\n Report a couple of changes in tshark usage\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * quagga_report\n Checking for babeld on RHEL-7.\n====> * checkacpid\n Check if acpid is installed. If yes, write information about non-compatible changes.\n====> * red_hat_signed_rpm_check\n Check if there are packages not signed by Red Hat in use. If yes, warn user about it.\n====> * check_ntp\n Check if ntp and/or ntpdate configuration needs to be migrated.\n====> * open_ssh_use_privilege_separation\n UsePrivilegeSeparation configuration option was removed.\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * sctp_checks\n Parses collected SCTP information and take necessary actions.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * zipl_check_boot_entries\n Inhibits the upgrade if a problematic Zipl configuration is detected on the system.\n====> * multiple_package_versions\n Check for problematic 32bit packages installed together with 64bit ones.\n====> * check_btrfs\n Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.\n====> * cups_check\n Reports changes in configuration between CUPS 1.6.3 and 2.2.6\n====> * check_ha_cluster\n Check if HA Cluster is in use. If yes, inhibit the upgrade process.\n====> * check_luks_and_inhibit\n Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\n 2. Use of NFS detected. Upgrade can't proceed\n\nHIGH and MEDIUM severity reports:\n 1. Packages available in excluded repositories will not be installed\n 2. GRUB2 core will be automatically updated during the upgrade\n 3. Difference in Python versions and support in RHEL 8\n 4. Packages not signed by Red Hat found on the system\n 5. chrony using default configuration\n 6. Module pam_pkcs11 will be removed from PAM configuration\n\nReports summary:\n Errors: 0\n Inhibitors: 2\n HIGH severity reports: 4\n MEDIUM severity reports: 2\n LOW severity reports: 5\n INFO severity reports: 3\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * scanmemory", " Scan Memory of the machine.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * scancpu", " Scan CPUs of the machine.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * storage_scanner", " Provides data about storage settings.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * system_facts", " Provides data about many facts from system.", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * quagga_daemons", " Active quagga daemons check.", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", " 2. Use of NFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. GRUB2 core will be automatically updated during the upgrade", " 3. Difference in Python versions and support in RHEL 8", " 4. Packages not signed by Red Hat found on the system", " 5. chrony using default configuration", " 6. Module pam_pkcs11 will be removed from PAM configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 2", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:89 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:97 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1763069776.6702874, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "5af777f142d1bdbdb24e67cc89c17c69b9335f68", "ctime": 1763069776.6702874, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 16778515, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1763069776.6702874, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 14457, "uid": 0, "version": "371889534", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:100 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"changed": false, "content": "Risk Factor: high (inhibitor)
Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.
Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:
     - pata_acpi

Related links:
    - Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." : https://access.redhat.com/solutions/6971716
    - Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.": https://access.redhat.com/solutions/5436131
Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b
----------------------------------------
Risk Factor: high (inhibitor)
Title: Use of NFS detected. Upgrade can't proceed
Summary: NFS is currently not supported by the inplace upgrade.
We have found NFS usage at the following locations:
- NFS shares found in /etc/fstab:
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat
 - nest.test.redhat.com:/mnt/qa /mnt/qa
 - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive
 - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew
 - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch

Related links:
    - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006
Remediation: [hint] Disable NFS temporarily for the upgrade if possible.
Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed
----------------------------------------
Risk Factor: high 
Title: Packages available in excluded repositories will not be installed
Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.
The list of these packages:
- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e
----------------------------------------
Risk Factor: high 
Title: GRUB2 core will be automatically updated during the upgrade
Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.
Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3
----------------------------------------
Risk Factor: high 
Title: Difference in Python versions and support in RHEL 8
Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python
Related links:
    - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python
Remediation: [hint] Please run "alternatives --set python /usr/bin/python3" after upgrade
Key: 0c98585b1d8d252eb540bf61560094f3495351f5
----------------------------------------
Risk Factor: high 
Title: Packages not signed by Red Hat found on the system
Summary: The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:
- beakerlib
- beakerlib-redhat
- epel-release
- restraint
- restraint-rhts
- tps-devel
Key: 13f0791ae5f19f50e7d0d606fb6501f91b1efb2c
----------------------------------------
Risk Factor: medium 
Title: chrony using default configuration
Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives
Key: c4222ebd18730a76f6bc7b3b66df898b106e6554
----------------------------------------
Risk Factor: medium 
Title: Module pam_pkcs11 will be removed from PAM configuration
Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.
Remediation: [hint] Configure SSSD to replace pam_pkcs11
Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3
----------------------------------------
Risk Factor: low 
Title: Grep has incompatible changes in the next major version
Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.
The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.
In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.
When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.
The 'grep -z' no longer automatically treats the byte '\200' as binary data.
Context no longer excludes selected lines omitted because of -m. For example, 'grep "^" -m1 -A1' now outputs the first two input lines, not just the first line.

Remediation: [hint] Please update your scripts to be compatible with the changes.
Key: 94665a499e2eeee35eca3e7093a7abe183384b16
----------------------------------------
Risk Factor: low 
Title: SElinux will be set to permissive mode
Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.
Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.
Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f
----------------------------------------
Risk Factor: low 
Title: Postfix has incompatible changes in the next major version
Summary: Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.
The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.
It can be turned on by running:  "postconf -e compatibility_level=0
It can be turned off by running: "postconf -e compatibility_level=2

In the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.

The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.

Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.

The "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.

The "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.

The "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.

The "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.

Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.

Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33
----------------------------------------
Risk Factor: low 
Title: Detected broken systemd symlinks for non-existing services
Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:
    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Remediation: [hint] Remove the invalid symlinks before the upgrade.
[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Key: be2083fee03f5f0a708fd193d82d2fe20aee7217
----------------------------------------
Risk Factor: low 
Title: Some enabled RPM repositories are unknown to Leapp
Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:
- rhel-Server
And the following packages installed from those repositories may not be upgraded:
- python3-libs
- perl-libs
- perl-XML-Twig
- perl-HTML-Tagset
- perl-parent
- efivar-libs
- perl-Time-HiRes
- perl-HTTP-Cookies
- vim-common
- perl-Pod-Perldoc
- libsolv
- perl-macros
- perl-IO-Compress
- python-slip-dbus
- perl-HTTP-Date
- ruby-libs
- perl-XML-NamespaceSupport
- rubygems
- grub2-efi-x64-modules
- perl-HTTP-Message
- ipset
- perl-Socket
- rubygem-psych
- libdrm
- perl-Time-Local
- rubygem-bigdecimal
- perl-File-Temp
- python3
- perl-Text-ParseWords
- gpm-libs
- perl-LWP-MediaTypes
- perl-Compress-Raw-Zlib
- perl-TermReadKey
- perl-threads
- perl-File-Listing
- rubygem-rdoc
- perl-Scalar-List-Utils
- perl-HTTP-Tiny
- perl-XML-SAX
- perl-LWP-Protocol-https
- vim-filesystem
- perl-IO-Zlib
- rng-tools
- libpciaccess
- perl-Mozilla-CA
- python-firewall
- json-glib
- perl-threads-shared
- mailcap
- perl-Business-ISBN-Data
- perl-Encode
- perl-Carp
- linux-firmware
- perl-HTTP-Negotiate
- rubygem-io-console
- perl-Data-Dumper
- perl-Exporter
- aic94xx-firmware
- wget
- vim-enhanced
- perl-libwww-perl
- perl-URI
- perl-Module-Load
- perl-XML-LibXML
- perl-File-Path
- perl-Encode-Locale
- perl-XML-SAX-Base
- perl-XML-Parser
- iprutils
- biosdevname
- perl-FCGI
- perl-TimeDate
- mokutil
- git
- perl-Compress-Raw-Bzip2
- perl
- perl-Font-AFM
- fxload
- perl-Storable
- perl-Digest-MD5
- plymouth-core-libs
- libreport-filesystem
- perl-Getopt-Long
- perl-HTML-Tree
- perl-IO-HTML
- ruby
- perl-PathTools
- perl-HTML-Parser
- ipset-libs
- perl-Net-LibIDN
- perl-Git
- firewalld
- plymouth
- perl-CGI
- python3-setuptools
- perl-WWW-RobotRules
- firewalld-filesystem
- shim-x64
- ruby-irb
- perl-Pod-Simple
- perl-Error
- perl-HTML-Format
- lsscsi
- perl-HTTP-Daemon
- alsa-lib
- redhat-logos
- rubygem-json
- perl-Date-Manip
- perl-Net-HTTP
- perl-Digest
- perl-IO-Socket-SSL
- ebtables
- plymouth-scripts
- perl-IO-stringy
- time
- perl-podlators
- perl-constant
- perl-Pod-Escapes
- perl-Net-SSLeay
- perl-Business-ISBN
- alsa-tools-firmware
- perl-Filter
- librepo
- perl-Pod-Usage
- python-slip
- alsa-firmware
- perl-IO-Socket-IP
- python3-pip
Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket
Key: 8e89e20c645cea600b240156071d81c64daab7ad
----------------------------------------
Risk Factor: info 
Title: Excluded target system repositories
Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.
- codeready-builder-beta-for-rhel-8-s390x-rpms
- codeready-builder-beta-for-rhel-8-ppc64le-rpms
- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-aarch64-eus-rpms
- codeready-builder-for-rhel-8-ppc64le-eus-rpms
- codeready-builder-beta-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-s390x-rpms
- codeready-builder-for-rhel-8-s390x-eus-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rpms
- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms
- codeready-builder-beta-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms
- codeready-builder-for-rhel-8-ppc64le-rpms
Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).
Key: 1b9132cb2362ae7830e48eee7811be9527747de8
----------------------------------------
Risk Factor: info 
Title: SElinux relabeling will be scheduled
Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.
Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72
----------------------------------------
Risk Factor: info 
Title: Current PAM and nsswitch.conf configuration will be kept.
Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.
Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c
----------------------------------------
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "2cf3d3a2-f69f-4a9d-8f36-b2fdee67cb59", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-11-13T21:35:58.009276Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-11-13T21:36:11.602236Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", 
      "severity": "high"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:36:12.354700Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", 
      "severity": "low"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-11-13T21:36:12.403805Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", 
      "severity": "high"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-11-13T21:36:12.525702Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-11-13T21:36:12.529280Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-11-13T21:36:12.645594Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", 
      "severity": "high"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:36:12.828053Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", 
      "severity": "low"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of NFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-11-13T21:36:12.870521Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964006", 
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Disable NFS temporarily for the upgrade if possible."
          }
        ]
      }, 
      "actor": "check_nfs", 
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", 
      "audience": "sysadmin", 
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", 
      "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-11-13T21:36:13.410338Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", 
      "severity": "low"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-11-13T21:36:14.287417Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-11-13T21:36:14.950897Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Twig"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tagset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-parent"
          }, 
          {
            "scheme": "package", 
            "title": "efivar-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-HiRes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Cookies"
          }, 
          {
            "scheme": "package", 
            "title": "vim-common"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Perldoc"
          }, 
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "perl-macros"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Compress"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip-dbus"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Date"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-NamespaceSupport"
          }, 
          {
            "scheme": "package", 
            "title": "rubygems"
          }, 
          {
            "scheme": "package", 
            "title": "grub2-efi-x64-modules"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Message"
          }, 
          {
            "scheme": "package", 
            "title": "ipset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Socket"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-psych"
          }, 
          {
            "scheme": "package", 
            "title": "libdrm"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-Local"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-bigdecimal"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Temp"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Text-ParseWords"
          }, 
          {
            "scheme": "package", 
            "title": "gpm-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-MediaTypes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TermReadKey"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Listing"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-rdoc"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Scalar-List-Utils"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Tiny"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-Protocol-https"
          }, 
          {
            "scheme": "package", 
            "title": "vim-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "rng-tools"
          }, 
          {
            "scheme": "package", 
            "title": "libpciaccess"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Mozilla-CA"
          }, 
          {
            "scheme": "package", 
            "title": "python-firewall"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads-shared"
          }, 
          {
            "scheme": "package", 
            "title": "mailcap"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN-Data"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Carp"
          }, 
          {
            "scheme": "package", 
            "title": "linux-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Negotiate"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-io-console"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Data-Dumper"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Exporter"
          }, 
          {
            "scheme": "package", 
            "title": "aic94xx-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "wget"
          }, 
          {
            "scheme": "package", 
            "title": "vim-enhanced"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libwww-perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-URI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Module-Load"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-LibXML"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Path"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode-Locale"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX-Base"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "iprutils"
          }, 
          {
            "scheme": "package", 
            "title": "biosdevname"
          }, 
          {
            "scheme": "package", 
            "title": "perl-FCGI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TimeDate"
          }, 
          {
            "scheme": "package", 
            "title": "mokutil"
          }, 
          {
            "scheme": "package", 
            "title": "git"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Bzip2"
          }, 
          {
            "scheme": "package", 
            "title": "perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Font-AFM"
          }, 
          {
            "scheme": "package", 
            "title": "fxload"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Storable"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest-MD5"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-core-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Getopt-Long"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tree"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-HTML"
          }, 
          {
            "scheme": "package", 
            "title": "ruby"
          }, 
          {
            "scheme": "package", 
            "title": "perl-PathTools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "ipset-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-LibIDN"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Git"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth"
          }, 
          {
            "scheme": "package", 
            "title": "perl-CGI"
          }, 
          {
            "scheme": "package", 
            "title": "python3-setuptools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-WWW-RobotRules"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "shim-x64"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-irb"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Simple"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Error"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Format"
          }, 
          {
            "scheme": "package", 
            "title": "lsscsi"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Daemon"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-lib"
          }, 
          {
            "scheme": "package", 
            "title": "redhat-logos"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-json"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Date-Manip"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-HTTP"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-SSL"
          }, 
          {
            "scheme": "package", 
            "title": "ebtables"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-scripts"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-stringy"
          }, 
          {
            "scheme": "package", 
            "title": "time"
          }, 
          {
            "scheme": "package", 
            "title": "perl-podlators"
          }, 
          {
            "scheme": "package", 
            "title": "perl-constant"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Escapes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-SSLeay"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-tools-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Filter"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Usage"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-IP"
          }, 
          {
            "scheme": "package", 
            "title": "python3-pip"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel-Server"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", 
      "severity": "low"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-11-13T21:36:14.988434Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", 
      "severity": "high"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-11-13T21:36:15.403889Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-11-13T21:36:15.447311Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "sanity"
      ], 
      "title": "Packages not signed by Red Hat found on the system", 
      "timeStamp": "2025-11-13T21:36:15.891681Z", 
      "hostname": "managed-node01", 
      "actor": "red_hat_signed_rpm_check", 
      "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", 
      "audience": "sysadmin", 
      "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", 
      "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", 
      "severity": "high"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node01] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:35:58.009276Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:36:11.602236Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:36:12.354700Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:36:12.525702Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:36:12.529280Z", "title": "SElinux will be set to permissive mode"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:36:12.645594Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:36:12.828053Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:36:13.410338Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:36:14.287417Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:36:14.950897Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:36:14.988434Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:36:15.403889Z", "title": "chrony using default configuration"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:36:15.447311Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:36:15.891681Z", "title": "Packages not signed by Red Hat found on the system"}], "leapp_run_id": "2cf3d3a2-f69f-4a9d-8f36-b2fdee67cb59"}, "leapp_report_txt": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------", "Risk Factor: high ", "Title: Packages available in excluded repositories will not be installed", "Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.", "The list of these packages:", "- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e", "----------------------------------------", "Risk Factor: high ", "Title: GRUB2 core will be automatically updated during the upgrade", "Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3", "----------------------------------------", "Risk Factor: high ", "Title: Difference in Python versions and support in RHEL 8", "Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "Related links:", " - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python", "Remediation: [hint] Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "Key: 0c98585b1d8d252eb540bf61560094f3495351f5", "----------------------------------------", "Risk Factor: high ", "Title: Packages not signed by Red Hat found on the system", "Summary: The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:", "- beakerlib", "- beakerlib-redhat", "- epel-release", "- restraint", "- restraint-rhts", "- tps-devel", "Key: 13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "----------------------------------------", "Risk Factor: medium ", "Title: chrony using default configuration", "Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "Key: c4222ebd18730a76f6bc7b3b66df898b106e6554", "----------------------------------------", "Risk Factor: medium ", "Title: Module pam_pkcs11 will be removed from PAM configuration", "Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "Remediation: [hint] Configure SSSD to replace pam_pkcs11", "Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "----------------------------------------", "Risk Factor: low ", "Title: Grep has incompatible changes in the next major version", "Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.", "The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.", "In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.", "When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.", "The 'grep -z' no longer automatically treats the byte '\\200' as binary data.", "Context no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.", "", "Remediation: [hint] Please update your scripts to be compatible with the changes.", "Key: 94665a499e2eeee35eca3e7093a7abe183384b16", "----------------------------------------", "Risk Factor: low ", "Title: SElinux will be set to permissive mode", "Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "----------------------------------------", "Risk Factor: low ", "Title: Postfix has incompatible changes in the next major version", "Summary: Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.", "The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.", "It can be turned on by running: \"postconf -e compatibility_level=0", "It can be turned off by running: \"postconf -e compatibility_level=2", "", "In the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.", "", "The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.", "", "Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.", "", "The \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.", "", "The \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.", "", "The \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.", "", "The \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.", "", "Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.", "", "Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "----------------------------------------", "Risk Factor: low ", "Title: Detected broken systemd symlinks for non-existing services", "Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:", " - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Remediation: [hint] Remove the invalid symlinks before the upgrade.", "[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Key: be2083fee03f5f0a708fd193d82d2fe20aee7217", "----------------------------------------", "Risk Factor: low ", "Title: Some enabled RPM repositories are unknown to Leapp", "Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:", "- rhel-Server", "And the following packages installed from those repositories may not be upgraded:", "- python3-libs", "- perl-libs", "- perl-XML-Twig", "- perl-HTML-Tagset", "- perl-parent", "- efivar-libs", "- perl-Time-HiRes", "- perl-HTTP-Cookies", "- vim-common", "- perl-Pod-Perldoc", "- libsolv", "- perl-macros", "- perl-IO-Compress", "- python-slip-dbus", "- perl-HTTP-Date", "- ruby-libs", "- perl-XML-NamespaceSupport", "- rubygems", "- grub2-efi-x64-modules", "- perl-HTTP-Message", "- ipset", "- perl-Socket", "- rubygem-psych", "- libdrm", "- perl-Time-Local", "- rubygem-bigdecimal", "- perl-File-Temp", "- python3", "- perl-Text-ParseWords", "- gpm-libs", "- perl-LWP-MediaTypes", "- perl-Compress-Raw-Zlib", "- perl-TermReadKey", "- perl-threads", "- perl-File-Listing", "- rubygem-rdoc", "- perl-Scalar-List-Utils", "- perl-HTTP-Tiny", "- perl-XML-SAX", "- perl-LWP-Protocol-https", "- vim-filesystem", "- perl-IO-Zlib", "- rng-tools", "- libpciaccess", "- perl-Mozilla-CA", "- python-firewall", "- json-glib", "- perl-threads-shared", "- mailcap", "- perl-Business-ISBN-Data", "- perl-Encode", "- perl-Carp", "- linux-firmware", "- perl-HTTP-Negotiate", "- rubygem-io-console", "- perl-Data-Dumper", "- perl-Exporter", "- aic94xx-firmware", "- wget", "- vim-enhanced", "- perl-libwww-perl", "- perl-URI", "- perl-Module-Load", "- perl-XML-LibXML", "- perl-File-Path", "- perl-Encode-Locale", "- perl-XML-SAX-Base", "- perl-XML-Parser", "- iprutils", "- biosdevname", "- perl-FCGI", "- perl-TimeDate", "- mokutil", "- git", "- perl-Compress-Raw-Bzip2", "- perl", "- perl-Font-AFM", "- fxload", "- perl-Storable", "- perl-Digest-MD5", "- plymouth-core-libs", "- libreport-filesystem", "- perl-Getopt-Long", "- perl-HTML-Tree", "- perl-IO-HTML", "- ruby", "- perl-PathTools", "- perl-HTML-Parser", "- ipset-libs", "- perl-Net-LibIDN", "- perl-Git", "- firewalld", "- plymouth", "- perl-CGI", "- python3-setuptools", "- perl-WWW-RobotRules", "- firewalld-filesystem", "- shim-x64", "- ruby-irb", "- perl-Pod-Simple", "- perl-Error", "- perl-HTML-Format", "- lsscsi", "- perl-HTTP-Daemon", "- alsa-lib", "- redhat-logos", "- rubygem-json", "- perl-Date-Manip", "- perl-Net-HTTP", "- perl-Digest", "- perl-IO-Socket-SSL", "- ebtables", "- plymouth-scripts", "- perl-IO-stringy", "- time", "- perl-podlators", "- perl-constant", "- perl-Pod-Escapes", "- perl-Net-SSLeay", "- perl-Business-ISBN", "- alsa-tools-firmware", "- perl-Filter", "- librepo", "- perl-Pod-Usage", "- python-slip", "- alsa-firmware", "- perl-IO-Socket-IP", "- python3-pip", "Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "Key: 8e89e20c645cea600b240156071d81c64daab7ad", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-beta-for-rhel-8-s390x-rpms", "- codeready-builder-beta-for-rhel-8-ppc64le-rpms", "- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-aarch64-eus-rpms", "- codeready-builder-for-rhel-8-ppc64le-eus-rpms", "- codeready-builder-beta-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-s390x-rpms", "- codeready-builder-for-rhel-8-s390x-eus-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rpms", "- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms", "- codeready-builder-beta-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms", "- codeready-builder-for-rhel-8-ppc64le-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", "Risk Factor: info ", "Title: SElinux relabeling will be scheduled", "Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.", "Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "----------------------------------------", "Risk Factor: info ", "Title: Current PAM and nsswitch.conf configuration will be kept.", "Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2025-11-13T21:35:58.009276Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': 'e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:35:58.009276Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-11-13T21:36:11.602236Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': '77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:36:11.602236Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:36:12.354700Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': '781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:36:12.354700Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2025-11-13T21:36:12.403805Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': '7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2025-11-13T21:36:12.525702Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': '5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:36:12.525702Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2025-11-13T21:36:12.529280Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': '159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:36:12.529280Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2025-11-13T21:36:12.645594Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': 'cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:36:12.645594Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:36:12.828053Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:36:12.828053Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2025-11-13T21:36:12.870521Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964006', 'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?'}], 'remediations': [{'type': 'hint', 'context': 'Disable NFS temporarily for the upgrade if possible.'}]}, 'actor': 'check_nfs', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n', 'audience': 'sysadmin', 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'id': '9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2025-11-13T21:36:13.410338Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': 'ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:36:13.410338Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2025-11-13T21:36:14.287417Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': 'c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:36:14.287417Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2025-11-13T21:36:14.950897Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-libs'}, {'scheme': 'package', 'title': 'perl-libs'}, {'scheme': 'package', 'title': 'perl-XML-Twig'}, {'scheme': 'package', 'title': 'perl-HTML-Tagset'}, {'scheme': 'package', 'title': 'perl-parent'}, {'scheme': 'package', 'title': 'efivar-libs'}, {'scheme': 'package', 'title': 'perl-Time-HiRes'}, {'scheme': 'package', 'title': 'perl-HTTP-Cookies'}, {'scheme': 'package', 'title': 'vim-common'}, {'scheme': 'package', 'title': 'perl-Pod-Perldoc'}, {'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'perl-macros'}, {'scheme': 'package', 'title': 'perl-IO-Compress'}, {'scheme': 'package', 'title': 'python-slip-dbus'}, {'scheme': 'package', 'title': 'perl-HTTP-Date'}, {'scheme': 'package', 'title': 'ruby-libs'}, {'scheme': 'package', 'title': 'perl-XML-NamespaceSupport'}, {'scheme': 'package', 'title': 'rubygems'}, {'scheme': 'package', 'title': 'grub2-efi-x64-modules'}, {'scheme': 'package', 'title': 'perl-HTTP-Message'}, {'scheme': 'package', 'title': 'ipset'}, {'scheme': 'package', 'title': 'perl-Socket'}, {'scheme': 'package', 'title': 'rubygem-psych'}, {'scheme': 'package', 'title': 'libdrm'}, {'scheme': 'package', 'title': 'perl-Time-Local'}, {'scheme': 'package', 'title': 'rubygem-bigdecimal'}, {'scheme': 'package', 'title': 'perl-File-Temp'}, {'scheme': 'package', 'title': 'python3'}, {'scheme': 'package', 'title': 'perl-Text-ParseWords'}, {'scheme': 'package', 'title': 'gpm-libs'}, {'scheme': 'package', 'title': 'perl-LWP-MediaTypes'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Zlib'}, {'scheme': 'package', 'title': 'perl-TermReadKey'}, {'scheme': 'package', 'title': 'perl-threads'}, {'scheme': 'package', 'title': 'perl-File-Listing'}, {'scheme': 'package', 'title': 'rubygem-rdoc'}, {'scheme': 'package', 'title': 'perl-Scalar-List-Utils'}, {'scheme': 'package', 'title': 'perl-HTTP-Tiny'}, {'scheme': 'package', 'title': 'perl-XML-SAX'}, {'scheme': 'package', 'title': 'perl-LWP-Protocol-https'}, {'scheme': 'package', 'title': 'vim-filesystem'}, {'scheme': 'package', 'title': 'perl-IO-Zlib'}, {'scheme': 'package', 'title': 'rng-tools'}, {'scheme': 'package', 'title': 'libpciaccess'}, {'scheme': 'package', 'title': 'perl-Mozilla-CA'}, {'scheme': 'package', 'title': 'python-firewall'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'perl-threads-shared'}, {'scheme': 'package', 'title': 'mailcap'}, {'scheme': 'package', 'title': 'perl-Business-ISBN-Data'}, {'scheme': 'package', 'title': 'perl-Encode'}, {'scheme': 'package', 'title': 'perl-Carp'}, {'scheme': 'package', 'title': 'linux-firmware'}, {'scheme': 'package', 'title': 'perl-HTTP-Negotiate'}, {'scheme': 'package', 'title': 'rubygem-io-console'}, {'scheme': 'package', 'title': 'perl-Data-Dumper'}, {'scheme': 'package', 'title': 'perl-Exporter'}, {'scheme': 'package', 'title': 'aic94xx-firmware'}, {'scheme': 'package', 'title': 'wget'}, {'scheme': 'package', 'title': 'vim-enhanced'}, {'scheme': 'package', 'title': 'perl-libwww-perl'}, {'scheme': 'package', 'title': 'perl-URI'}, {'scheme': 'package', 'title': 'perl-Module-Load'}, {'scheme': 'package', 'title': 'perl-XML-LibXML'}, {'scheme': 'package', 'title': 'perl-File-Path'}, {'scheme': 'package', 'title': 'perl-Encode-Locale'}, {'scheme': 'package', 'title': 'perl-XML-SAX-Base'}, {'scheme': 'package', 'title': 'perl-XML-Parser'}, {'scheme': 'package', 'title': 'iprutils'}, {'scheme': 'package', 'title': 'biosdevname'}, {'scheme': 'package', 'title': 'perl-FCGI'}, {'scheme': 'package', 'title': 'perl-TimeDate'}, {'scheme': 'package', 'title': 'mokutil'}, {'scheme': 'package', 'title': 'git'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Bzip2'}, {'scheme': 'package', 'title': 'perl'}, {'scheme': 'package', 'title': 'perl-Font-AFM'}, {'scheme': 'package', 'title': 'fxload'}, {'scheme': 'package', 'title': 'perl-Storable'}, {'scheme': 'package', 'title': 'perl-Digest-MD5'}, {'scheme': 'package', 'title': 'plymouth-core-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'perl-Getopt-Long'}, {'scheme': 'package', 'title': 'perl-HTML-Tree'}, {'scheme': 'package', 'title': 'perl-IO-HTML'}, {'scheme': 'package', 'title': 'ruby'}, {'scheme': 'package', 'title': 'perl-PathTools'}, {'scheme': 'package', 'title': 'perl-HTML-Parser'}, {'scheme': 'package', 'title': 'ipset-libs'}, {'scheme': 'package', 'title': 'perl-Net-LibIDN'}, {'scheme': 'package', 'title': 'perl-Git'}, {'scheme': 'package', 'title': 'firewalld'}, {'scheme': 'package', 'title': 'plymouth'}, {'scheme': 'package', 'title': 'perl-CGI'}, {'scheme': 'package', 'title': 'python3-setuptools'}, {'scheme': 'package', 'title': 'perl-WWW-RobotRules'}, {'scheme': 'package', 'title': 'firewalld-filesystem'}, {'scheme': 'package', 'title': 'shim-x64'}, {'scheme': 'package', 'title': 'ruby-irb'}, {'scheme': 'package', 'title': 'perl-Pod-Simple'}, {'scheme': 'package', 'title': 'perl-Error'}, {'scheme': 'package', 'title': 'perl-HTML-Format'}, {'scheme': 'package', 'title': 'lsscsi'}, {'scheme': 'package', 'title': 'perl-HTTP-Daemon'}, {'scheme': 'package', 'title': 'alsa-lib'}, {'scheme': 'package', 'title': 'redhat-logos'}, {'scheme': 'package', 'title': 'rubygem-json'}, {'scheme': 'package', 'title': 'perl-Date-Manip'}, {'scheme': 'package', 'title': 'perl-Net-HTTP'}, {'scheme': 'package', 'title': 'perl-Digest'}, {'scheme': 'package', 'title': 'perl-IO-Socket-SSL'}, {'scheme': 'package', 'title': 'ebtables'}, {'scheme': 'package', 'title': 'plymouth-scripts'}, {'scheme': 'package', 'title': 'perl-IO-stringy'}, {'scheme': 'package', 'title': 'time'}, {'scheme': 'package', 'title': 'perl-podlators'}, {'scheme': 'package', 'title': 'perl-constant'}, {'scheme': 'package', 'title': 'perl-Pod-Escapes'}, {'scheme': 'package', 'title': 'perl-Net-SSLeay'}, {'scheme': 'package', 'title': 'perl-Business-ISBN'}, {'scheme': 'package', 'title': 'alsa-tools-firmware'}, {'scheme': 'package', 'title': 'perl-Filter'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'perl-Pod-Usage'}, {'scheme': 'package', 'title': 'python-slip'}, {'scheme': 'package', 'title': 'alsa-firmware'}, {'scheme': 'package', 'title': 'perl-IO-Socket-IP'}, {'scheme': 'package', 'title': 'python3-pip'}, {'scheme': 'repository', 'title': 'rhel-Server'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': '906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:36:14.950897Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2025-11-13T21:36:14.988434Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': '4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:36:14.988434Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2025-11-13T21:36:15.403889Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': '79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:36:15.403889Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2025-11-13T21:36:15.447311Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': 'd3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:36:15.447311Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['sanity'], 'title': 'Packages not signed by Red Hat found on the system', 'timeStamp': '2025-11-13T21:36:15.891681Z', 'hostname': 'managed-node01', 'actor': 'red_hat_signed_rpm_check', 'summary': 'The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel', 'audience': 'sysadmin', 'key': '13f0791ae5f19f50e7d0d606fb6501f91b1efb2c', 'id': 'd5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:36:15.891681Z", "title": "Packages not signed by Red Hat found on the system"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003847", "end": "2025-11-13 16:37:17.330581", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:37:17.326734", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\nSummary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: f08a07da902958defa4f5c2699fae9ec2eb67c5b\n----------------------------------------\nRisk Factor: high (inhibitor)\nTitle: Use of NFS detected. Upgrade can't proceed\nSummary: NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n\nRelated links:\n - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006\nRemediation: [hint] Disable NFS temporarily for the upgrade if possible.\nKey: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003764", "end": "2025-11-13 16:37:17.602842", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:37:17.599078", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:8 META: triggered running handlers for managed-node01 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1763069697.861854, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 40, "charset": "us-ascii", "checksum": "b9e49d59d6c9f6bbf8c4e228c678790607686370", "ctime": 1763069776.8512886, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 58720344, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1763069776.8512886, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 17500, "uid": 0, "version": "176326845", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"changed": false, "content": "RIPU preupgrade analysis
Job started at 2025-11-13T21:34:57Z
==> Processing phase `configuration_phase`
====> * ipu_workflow_config
        IPU workflow config actor
==> Processing phase `FactsCollection`
====> * scan_files_for_target_userspace
        Scan the source system and identify files that will be copied into the target userspace when it is created.
====> * authselect_scanner
        Detect what authselect configuration should be suggested to administrator.
====> * transaction_workarounds
        Provides additional RPM transaction tasks based on bundled RPM packages.
====> * common_leapp_dracut_modules
        Influences the generation of the initram disk
====> * persistentnetnames
        Get network interface information for physical ethernet interfaces of the original system.
====> * scan_grub_device_name
        Find the name of the block devices where GRUB is located
====> * read_openssh_config
        Collect information about the OpenSSH configuration.
====> * scan_subscription_manager_info
        Scans the current system for subscription manager information
====> * scanmemory
        Scan Memory of the machine.
====> * pam_modules_scanner
        Scan the pam directory for services and modules used in them
====> * persistentnetnamesdisable
        Disable systemd-udevd persistent network naming on machine with single eth0 NIC
====> * scan_systemd_source
        Provides info about systemd on the source system
====> * root_scanner
        Scan the system root directory and produce a message containing
====> * network_manager_read_config
        Provides data about NetworkManager configuration.
====> * scan_sap_hana
        Gathers information related to SAP HANA instances on the system.
====> * udevadm_info
        Produces data exported by the "udevadm info" command.
====> * scan_source_files
        Scan files (explicitly specified) of the source system.
====> * scan_kernel_cmdline
        No documentation has been provided for the scan_kernel_cmdline actor.
====> * scan_grub_device_partition_layout
        Scan all identified GRUB devices for their partition layout.
====> * copy_dnf_conf_into_target_userspace
        Copy dnf.conf into target userspace
====> * scanzfcp
        In case of s390x architecture, check whether ZFCP is used.
====> * load_device_driver_deprecation_data
        Loads deprecation data for drivers and devices (PCI & CPU)
====> * scan_pkg_manager
        Provides data about package manager (yum/dnf)
====> * tcp_wrappers_config_read
        Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.
====> * scanclienablerepo
        Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.
====> * scancpu
        Scan CPUs of the machine.
====> * removed_pam_modules_scanner
        Scan PAM configuration for modules that are not available in RHEL-8.
====> * scan_custom_modifications_actor
        Collects information about files in leapp directories that have been modified or newly added.
====> * register_yum_adjustment
        Registers a workaround which will adjust the yum directories during the upgrade.
====> * scan_target_os_image
        Scans the provided target OS ISO image to use as a content source for the IPU, if any.
====> * repository_mapping
        Produces message containing repository mapping based on provided file.
====> * storage_scanner
        Provides data about storage settings.
====> * source_boot_loader_scanner
        Scans the boot loader configuration on the source system.
====> * check_grub_legacy
        Check whether GRUB Legacy is installed in the MBR.
====> * rpm_scanner
        Provides data about installed RPM Packages.
====> * scan_grub_config
        Scan grub configuration files for errors.
====> * scandasd
        In case of s390x architecture, check whether DASD is used.
====> * sssd_facts
        Check SSSD configuration for changes in RHEL8 and report them in model.
====> * firewalld_facts_actor
        Provide data about firewalld
====> * get_enabled_modules
        Provides data about which module streams are enabled on the source system.
====> * scan_custom_repofile
        Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.
====> * biosdevname
        Enable biosdevname on the target RHEL system if all interfaces on the source RHEL
====> * system_facts
        Provides data about many facts from system.
====> * check_kde_apps
        Actor checks which KDE apps are installed.
====> * scan_fips
        Determine whether the source system has FIPS enabled.
====> * distribution_signed_rpm_scanner
        Provide data about distribution signed & unsigned RPM packages.
====> * scan_dynamic_linker_configuration
        Scan the dynamic linker configuration and find modifications.
====> * pci_devices_scanner
        Provides data about existing PCI Devices.
====> * trusted_gpg_keys_scanner
        Scan for trusted GPG keys.
====> * checkrhui
        Check if system is using RHUI infrastructure (on public cloud) and send messages to
====> * xfs_info_scanner
        This actor scans all mounted mountpoints for XFS information
====> * remove_obsolete_gpg_keys
        Remove obsoleted RPM GPG keys.
====> * multipath_conf_read
        Read multipath configuration files and extract the necessary information
====> * vsftpd_config_read
        Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.
====> * repositories_blacklist
        Exclude target repositories provided by Red Hat without support.
====> * satellite_upgrade_facts
        Report which Satellite packages require updates and how to handle PostgreSQL data
====> * detect_kernel_drivers
        Matches all currently loaded kernel drivers against known deprecated and removed drivers.
====> * get_installed_desktops
        Actor checks if kde or gnome desktop environments
====> * quagga_daemons
        Active quagga daemons check.
====> * cups_scanner
        Gather facts about CUPS features which needs to be migrated
====> * rpm_transaction_config_tasks_collector
        Provides additional RPM transaction tasks from /etc/leapp/transaction.
====> * selinuxcontentscanner
        Scan the system for any SELinux customizations
====> * scan_source_kernel
        Scan the source system kernel.
====> * sctp_read_status
        Determines whether or not the SCTP kernel module might be wanted.
====> * ipa_scanner
        Scan system for ipa-client and ipa-server status
====> * spamassassin_config_read
        Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the
====> * used_repository_scanner
        Scan used enabled repositories
====> * pes_events_scanner
        Provides data about package events from Package Evolution Service.
====> * setuptargetrepos
        Produces list of repositories that should be available to be used by Upgrade process.
==> Processing phase `Checks`
====> * check_ipa_server
        Check for ipa-server and inhibit upgrade
====> * sssd_check
        Check SSSD configuration for changes in RHEL8 and report them.
====> * check_root_symlinks
        Check if the symlinks /bin and /lib are relative, not absolute.
====> * check_yum_plugins_enabled
        Checks that the required yum plugins are enabled.
====> * vsftpd_config_check
        Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that
====> * check_mount_options
        Check for mount options preventing the upgrade.
====> * tcp_wrappers_check
        Check the list of packages previously compiled with TCP wrappers support
====> * postgresql_check
        Actor checking for presence of PostgreSQL installation.
====> * detect_grub_config_error
        Check grub configuration for various errors.
====> * checkgrep
        Check if Grep is installed. If yes, write information about non-compatible changes.
====> * check_detected_devices_and_drivers
        Checks whether or not detected devices and drivers are usable on the target system.
====> * satellite_upgrade_check
        Check state of Satellite system before upgrade
====> * openssh_permit_root_login
        OpenSSH no longer allows root logins with password.
====> * check_se_linux
        Check SELinux status and produce decision messages for further action.
====> * checkirssi
        Check if irssi is installed. If yes, write information about non-compatible changes.
====> * check_grub_core
        Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core
====> * checkmemory
        The actor check the size of RAM against RHEL8 minimal hardware requirements
====> * open_ssh_protocol
        Protocol configuration option was removed.
====> * check_persistent_mounts
        Check if mounts required to be persistent are mounted in persistent fashion.
====> * check_postfix
        Check if postfix is installed, check whether configuration update is needed.
====> * check_nfs
        Check if NFS filesystem is in use. If yes, inhibit the upgrade process.
====> * multipath_conf_check
        Checks whether the multipath configuration can be updated to RHEL-8 and
====> * check_bind
        Actor parsing BIND configuration and checking for known issues in it.
====> * check_target_iso
        Check that the provided target ISO is a valid ISO image and is located on a persistent partition.
====> * checktargetrepos
        Check whether target yum repositories are specified.
====> * unsupported_upgrade_check
        Checks environment variables and produces a warning report if the upgrade is unsupported.
====> * check_sap_hana
        If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.
====> * check_kde_gnome
        Checks whether KDE is installed
====> * efi_check_boot
        Adjust EFI boot entry for first reboot
====> * enable_device_cio_free_service
        Enables device_cio_free.service systemd service on s390x
====> * check_custom_modifications_actor
        Checks CustomModifications messages and produces a report about files in leapp directories that have been
====> * check_systemd_broken_symlinks
        Check whether some systemd symlinks are broken
====> * check_system_arch
        Check if system is running at a supported architecture. If no, inhibit the upgrade process.
====> * checkfstabxfsoptions
        Check the FSTAB file for the deprecated / removed XFS mount options.
====> * check_first_partition_offset
        Check whether the first partition starts at the offset >=1MiB.
====> * removed_pam_modules
        Check for modules that are not available in RHEL 8 anymore
====> * check_fstab_mount_order
        Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.
====> * checkdosfstools
        Check if dosfstools is installed. If yes, write information about non-compatible changes.
====> * check_installed_kernels
        Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.
====> * check_sendmail
        Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers
====> * check_cifs
        Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.
====> * open_ssh_deprecated_directives_check
        Check for any deprecated directives in the OpenSSH configuration.
====> * checkhybridimage
        Check if the system is using Azure hybrid image.
====> * check_docker
        Checks if Docker is installed and warns about its deprecation in RHEL8.
====> * check_rhsmsku
        Ensure the system is subscribed to the subscription manager
====> * authselect_check
        Confirm suggested authselect call from AuthselectScanner.
====> * check_boot_avail_space
        Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.
====> * check_removed_envvars
        Check for usage of removed environment variables and inhibit the upgrade
====> * check_installed_devel_kernels
        Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.
====> * check_os_release
        Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.
====> * check_memcached
        Check for incompatible changes in memcached configuration.
====> * check_openssl_conf
        Check whether the openssl configuration and openssl-IBMCA.
====> * check_firewalld
        Check for certain firewalld configuration that may prevent an upgrade.
====> * powertop
        Check if PowerTOP is installed. If yes, write information about non-compatible changes.
====> * check_brltty
        Check if brltty is installed, check whether configuration update is needed.
====> * check_skipped_repositories
        Produces a report if any repositories enabled on the system are going to be skipped.
====> * python_inform_user
        This actor informs the user of differences in Python version and support in RHEL 8.
====> * open_ssh_algorithms
        OpenSSH configuration does not contain any unsupported cryptographic algorithms.
====> * check_installed_debug_kernels
        Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.
====> * check_etc_releasever
        Check releasever info and provide a guidance based on the facts
====> * check_fips
        Inhibit upgrade if FIPS is detected as enabled.
====> * bacula_check
        Actor checking for presence of Bacula installation.
====> * check_chrony
        Check for incompatible changes in chrony configuration.
====> * removed_pam_modules_check
        Check if it is all right to disable PAM modules that are not in RHEL-8.
====> * check_consumed_assets
        Check whether Leapp is using correct data assets.
====> * spamassassin_config_check
        Reports changes in spamassassin between RHEL-7 and RHEL-8
====> * check_wireshark
        Report a couple of changes in tshark usage
====> * check_insights_auto_register
        Checks if system can be automatically registered into Red Hat Insights
====> * quagga_report
        Checking for babeld on RHEL-7.
====> * checkacpid
        Check if acpid is installed. If yes, write information about non-compatible changes.
====> * red_hat_signed_rpm_check
        Check if there are packages not signed by Red Hat in use. If yes, warn user about it.
====> * check_ntp
        Check if ntp and/or ntpdate configuration needs to be migrated.
====> * open_ssh_use_privilege_separation
        UsePrivilegeSeparation configuration option was removed.
====> * check_dynamic_linker_configuration
        Check for customization of dynamic linker configuration.
====> * sctp_checks
        Parses collected SCTP information and take necessary actions.
====> * cephvolumescan
        Retrieves the list of encrypted Ceph OSD
====> * zipl_check_boot_entries
        Inhibits the upgrade if a problematic Zipl configuration is detected on the system.
====> * multiple_package_versions
        Check for problematic 32bit packages installed together with 64bit ones.
====> * check_btrfs
        Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.
====> * cups_check
        Reports changes in configuration between CUPS 1.6.3 and 2.2.6
====> * check_ha_cluster
        Check if HA Cluster is in use. If yes, inhibit the upgrade process.
====> * check_luks_and_inhibit
        Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.
====> * check_rpm_transaction_events
        Filter RPM transaction events based on installed RPM packages
====> * check_skip_phase
        Skip all the subsequent phases until the report phase.
==> Processing phase `Reports`
====> * verify_check_results
        Check all dialogs and notify that user needs to make some choices.
====> * verify_check_results
        Check all generated results messages and notify user about them.

Debug output written to /var/log/leapp/leapp-preupgrade.log

============================================================
                      REPORT OVERVIEW                       
============================================================

Upgrade has been inhibited due to the following problems:
    1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.
    2. Use of NFS detected. Upgrade can't proceed

HIGH and MEDIUM severity reports:
    1. Packages available in excluded repositories will not be installed
    2. GRUB2 core will be automatically updated during the upgrade
    3. Difference in Python versions and support in RHEL 8
    4. Packages not signed by Red Hat found on the system
    5. chrony using default configuration
    6. Module pam_pkcs11 will be removed from PAM configuration

Reports summary:
    Errors:                      0
    Inhibitors:                  2
    HIGH severity reports:       4
    MEDIUM severity reports:     2
    LOW severity reports:        5
    INFO severity reports:       3

Before continuing, review the full report below for details about discovered problems and possible remediation instructions:
    A report has been generated at /var/log/leapp/leapp-report.txt
    A report has been generated at /var/log/leapp/leapp-report.json

============================================================
                   END OF REPORT OVERVIEW                   
============================================================

Answerfile has been generated at /var/log/leapp/answerfile
Job ended at 2025-11-13T21:37:18Z
", "encoding": "base64", "source": "/var/log/ripu/ripu.log"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 ok: [managed-node01] => {"ansible_facts": {"ripu_log_file": ["RIPU preupgrade analysis", "Job started at 2025-11-13T21:34:57Z", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * scanmemory", " Scan Memory of the machine.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * scancpu", " Scan CPUs of the machine.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * storage_scanner", " Provides data about storage settings.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * system_facts", " Provides data about many facts from system.", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * quagga_daemons", " Active quagga daemons check.", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", " 2. Use of NFS detected. Upgrade can't proceed", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. GRUB2 core will be automatically updated during the upgrade", " 3. Difference in Python versions and support in RHEL 8", " 4. Packages not signed by Red Hat found on the system", " 5. chrony using default configuration", " 6. Module pam_pkcs11 will be removed from PAM configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 2", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile", "Job ended at 2025-11-13T21:37:18Z", ""]}, "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251113T163455\n", "delta": "0:00:00.004215", "end": "2025-11-13 16:37:18.898668", "msg": "", "rc": 0, "start": "2025-11-13 16:37:18.894453", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:32 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high (inhibitor)", "Title: Use of NFS detected. Upgrade can't proceed", "Summary: NFS is currently not supported by the inplace upgrade.", "We have found NFS usage at the following locations:", "- NFS shares found in /etc/fstab:", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat", " - nest.test.redhat.com:/mnt/qa /mnt/qa", " - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive", " - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew", " - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch", "", "Related links:", " - Why does leapp upgrade fail on detecting NFS during upgrade?: https://access.redhat.com/solutions/6964006", "Remediation: [hint] Disable NFS temporarily for the upgrade if possible.", "Key: 9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:40 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:48 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } TASK [common_upgrade_tasks | Show all inhibitors collected by analysis] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:11 ok: [managed-node01] => { "leapp_inhibitors": [ { "actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": { "external": [ { "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716" }, { "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131" } ] }, "groups": [ "kernel", "drivers", "inhibitor" ], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." }, { "actor": "check_nfs", "audience": "sysadmin", "detail": { "external": [ { "title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006" } ], "related_resources": [ { "scheme": "file", "title": "/etc/fstab" } ], "remediations": [ { "context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint" } ] }, "groups": [ "filesystem", "network", "inhibitor" ], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed" } ] } TASK [common_upgrade_tasks | Extract inhibitor titles] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:15 ok: [managed-node01] => {"ansible_facts": {"inhibitor_titles": ["Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Use of NFS detected. Upgrade can't proceed"]}, "changed": false} TASK [common_upgrade_tasks | Initialize remediation_todo] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:19 ok: [managed-node01] => {"ansible_facts": {"remediation_todo": []}, "changed": false} TASK [common_upgrade_tasks | Map inhibitors to remediation_todo] *************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:23 ok: [managed-node01] => (item=Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.) => {"ansible_facts": {"remediation_todo": ["leapp_loaded_removed_kernel_drivers"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."} ok: [managed-node01] => (item=Use of NFS detected. Upgrade can't proceed) => {"ansible_facts": {"remediation_todo": ["leapp_loaded_removed_kernel_drivers", "leapp_nfs_detected"]}, "ansible_loop_var": "inhibitor_title", "changed": false, "inhibitor_title": "Use of NFS detected. Upgrade can't proceed"} TASK [common_upgrade_tasks | Debug remediation_todo] *************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:33 ok: [managed-node01] => { "remediation_todo": [ "leapp_loaded_removed_kernel_drivers", "leapp_nfs_detected" ] } TASK [common_upgrade_tasks | Run remediation] ********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:37 TASK [infra.leapp.remediate : Check if the system is RHEL 7 or 8] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:4 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [infra.leapp.remediate : Remediate the system] **************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/main.yml:10 skipping: [managed-node01] => (item=leapp_cifs_detected) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_cifs_detected", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_corrupted_grubenv_file) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_corrupted_grubenv_file", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_custom_network_scripts_detected) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_custom_network_scripts_detected", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_deprecated_sshd_directive) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_deprecated_sshd_directive", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_firewalld_allowzonedrifting) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_firewalld_allowzonedrifting", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_firewalld_unsupported_tftp_client) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_firewalld_unsupported_tftp_client", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_missing_efibootmgr) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_missing_efibootmgr", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_missing_pkg) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_missing_pkg", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_missing_yum_plugins) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_missing_yum_plugins", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_move_usr_directory) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_move_usr_directory", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_multiple_kernels) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_multiple_kernels", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_newest_kernel_not_in_use) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_newest_kernel_not_in_use", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_non_persistent_partitions) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_non_persistent_partitions", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_non_standard_openssl_config) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_non_standard_openssl_config", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_old_postgresql_data) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_old_postgresql_data", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_pam_tally2) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_pam_tally2", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_partitions_with_noexec) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_partitions_with_noexec", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_relative_symlinks) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_relative_symlinks", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_remote_using_root) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_remote_using_root", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_rpms_with_rsa_sha1_detected) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_rpms_with_rsa_sha1_detected", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_unavailable_kde) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_unavailable_kde", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item=leapp_vdo_check_needed) => {"ansible_loop_var": "remediation_item", "changed": false, "remediation_item": "leapp_vdo_check_needed", "skip_reason": "Conditional result was False"} included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml for managed-node01 => (item=leapp_loaded_removed_kernel_drivers) included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml for managed-node01 => (item=leapp_nfs_detected) TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Check that the leapp-report.json exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:7 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1763069836.7686286, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 72, "charset": "us-ascii", "checksum": "a2b0e942ef3435ce604608f73c4f5415e085d0ea", "ctime": 1763069776.6732874, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 16778516, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1763069776.6732874, "nlink": 1, "path": "/var/log/leapp/leapp-report.json", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 35684, "uid": 0, "version": "18446744073404096205", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | End execution of playbook if leapp report does not exist] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:12 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Read leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:18 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "2cf3d3a2-f69f-4a9d-8f36-b2fdee67cb59", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-11-13T21:35:58.009276Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-11-13T21:36:11.602236Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", 
      "severity": "high"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:36:12.354700Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", 
      "severity": "low"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-11-13T21:36:12.403805Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", 
      "severity": "high"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-11-13T21:36:12.525702Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-11-13T21:36:12.529280Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-11-13T21:36:12.645594Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", 
      "severity": "high"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:36:12.828053Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", 
      "severity": "low"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of NFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-11-13T21:36:12.870521Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964006", 
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Disable NFS temporarily for the upgrade if possible."
          }
        ]
      }, 
      "actor": "check_nfs", 
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", 
      "audience": "sysadmin", 
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", 
      "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-11-13T21:36:13.410338Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", 
      "severity": "low"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-11-13T21:36:14.287417Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-11-13T21:36:14.950897Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Twig"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tagset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-parent"
          }, 
          {
            "scheme": "package", 
            "title": "efivar-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-HiRes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Cookies"
          }, 
          {
            "scheme": "package", 
            "title": "vim-common"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Perldoc"
          }, 
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "perl-macros"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Compress"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip-dbus"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Date"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-NamespaceSupport"
          }, 
          {
            "scheme": "package", 
            "title": "rubygems"
          }, 
          {
            "scheme": "package", 
            "title": "grub2-efi-x64-modules"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Message"
          }, 
          {
            "scheme": "package", 
            "title": "ipset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Socket"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-psych"
          }, 
          {
            "scheme": "package", 
            "title": "libdrm"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-Local"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-bigdecimal"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Temp"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Text-ParseWords"
          }, 
          {
            "scheme": "package", 
            "title": "gpm-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-MediaTypes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TermReadKey"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Listing"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-rdoc"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Scalar-List-Utils"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Tiny"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-Protocol-https"
          }, 
          {
            "scheme": "package", 
            "title": "vim-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "rng-tools"
          }, 
          {
            "scheme": "package", 
            "title": "libpciaccess"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Mozilla-CA"
          }, 
          {
            "scheme": "package", 
            "title": "python-firewall"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads-shared"
          }, 
          {
            "scheme": "package", 
            "title": "mailcap"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN-Data"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Carp"
          }, 
          {
            "scheme": "package", 
            "title": "linux-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Negotiate"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-io-console"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Data-Dumper"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Exporter"
          }, 
          {
            "scheme": "package", 
            "title": "aic94xx-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "wget"
          }, 
          {
            "scheme": "package", 
            "title": "vim-enhanced"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libwww-perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-URI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Module-Load"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-LibXML"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Path"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode-Locale"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX-Base"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "iprutils"
          }, 
          {
            "scheme": "package", 
            "title": "biosdevname"
          }, 
          {
            "scheme": "package", 
            "title": "perl-FCGI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TimeDate"
          }, 
          {
            "scheme": "package", 
            "title": "mokutil"
          }, 
          {
            "scheme": "package", 
            "title": "git"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Bzip2"
          }, 
          {
            "scheme": "package", 
            "title": "perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Font-AFM"
          }, 
          {
            "scheme": "package", 
            "title": "fxload"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Storable"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest-MD5"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-core-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Getopt-Long"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tree"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-HTML"
          }, 
          {
            "scheme": "package", 
            "title": "ruby"
          }, 
          {
            "scheme": "package", 
            "title": "perl-PathTools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "ipset-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-LibIDN"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Git"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth"
          }, 
          {
            "scheme": "package", 
            "title": "perl-CGI"
          }, 
          {
            "scheme": "package", 
            "title": "python3-setuptools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-WWW-RobotRules"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "shim-x64"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-irb"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Simple"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Error"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Format"
          }, 
          {
            "scheme": "package", 
            "title": "lsscsi"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Daemon"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-lib"
          }, 
          {
            "scheme": "package", 
            "title": "redhat-logos"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-json"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Date-Manip"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-HTTP"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-SSL"
          }, 
          {
            "scheme": "package", 
            "title": "ebtables"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-scripts"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-stringy"
          }, 
          {
            "scheme": "package", 
            "title": "time"
          }, 
          {
            "scheme": "package", 
            "title": "perl-podlators"
          }, 
          {
            "scheme": "package", 
            "title": "perl-constant"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Escapes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-SSLeay"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-tools-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Filter"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Usage"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-IP"
          }, 
          {
            "scheme": "package", 
            "title": "python3-pip"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel-Server"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", 
      "severity": "low"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-11-13T21:36:14.988434Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", 
      "severity": "high"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-11-13T21:36:15.403889Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-11-13T21:36:15.447311Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "sanity"
      ], 
      "title": "Packages not signed by Red Hat found on the system", 
      "timeStamp": "2025-11-13T21:36:15.891681Z", 
      "hostname": "managed-node01", 
      "actor": "red_hat_signed_rpm_check", 
      "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", 
      "audience": "sysadmin", 
      "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", 
      "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", 
      "severity": "high"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Parse leapp report to json] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:23 ok: [managed-node01] => {"ansible_facts": {"leappreportdata": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:35:58.009276Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:36:11.602236Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:36:12.354700Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:36:12.525702Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:36:12.529280Z", "title": "SElinux will be set to permissive mode"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:36:12.645594Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:36:12.828053Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:36:13.410338Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:36:14.287417Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:36:14.950897Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:36:14.988434Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:36:15.403889Z", "title": "chrony using default configuration"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:36:15.447311Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:36:15.891681Z", "title": "Packages not signed by Red Hat found on the system"}], "leapp_run_id": "2cf3d3a2-f69f-4a9d-8f36-b2fdee67cb59"}}, "changed": false} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Find entry in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:27 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2025-11-13T21:35:58.009276Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': 'e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:35:58.009276Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-11-13T21:36:11.602236Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': '77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:36:11.602236Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:36:12.354700Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': '781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:36:12.354700Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2025-11-13T21:36:12.403805Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': '7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a', 'severity': 'high'}) => {"ansible_facts": {"leapp_entry": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2025-11-13T21:36:12.525702Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': '5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:36:12.525702Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2025-11-13T21:36:12.529280Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': '159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:36:12.529280Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2025-11-13T21:36:12.645594Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': 'cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:36:12.645594Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:36:12.828053Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:36:12.828053Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2025-11-13T21:36:12.870521Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964006', 'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?'}], 'remediations': [{'type': 'hint', 'context': 'Disable NFS temporarily for the upgrade if possible.'}]}, 'actor': 'check_nfs', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n', 'audience': 'sysadmin', 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'id': '9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2025-11-13T21:36:13.410338Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': 'ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:36:13.410338Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2025-11-13T21:36:14.287417Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': 'c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:36:14.287417Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2025-11-13T21:36:14.950897Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-libs'}, {'scheme': 'package', 'title': 'perl-libs'}, {'scheme': 'package', 'title': 'perl-XML-Twig'}, {'scheme': 'package', 'title': 'perl-HTML-Tagset'}, {'scheme': 'package', 'title': 'perl-parent'}, {'scheme': 'package', 'title': 'efivar-libs'}, {'scheme': 'package', 'title': 'perl-Time-HiRes'}, {'scheme': 'package', 'title': 'perl-HTTP-Cookies'}, {'scheme': 'package', 'title': 'vim-common'}, {'scheme': 'package', 'title': 'perl-Pod-Perldoc'}, {'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'perl-macros'}, {'scheme': 'package', 'title': 'perl-IO-Compress'}, {'scheme': 'package', 'title': 'python-slip-dbus'}, {'scheme': 'package', 'title': 'perl-HTTP-Date'}, {'scheme': 'package', 'title': 'ruby-libs'}, {'scheme': 'package', 'title': 'perl-XML-NamespaceSupport'}, {'scheme': 'package', 'title': 'rubygems'}, {'scheme': 'package', 'title': 'grub2-efi-x64-modules'}, {'scheme': 'package', 'title': 'perl-HTTP-Message'}, {'scheme': 'package', 'title': 'ipset'}, {'scheme': 'package', 'title': 'perl-Socket'}, {'scheme': 'package', 'title': 'rubygem-psych'}, {'scheme': 'package', 'title': 'libdrm'}, {'scheme': 'package', 'title': 'perl-Time-Local'}, {'scheme': 'package', 'title': 'rubygem-bigdecimal'}, {'scheme': 'package', 'title': 'perl-File-Temp'}, {'scheme': 'package', 'title': 'python3'}, {'scheme': 'package', 'title': 'perl-Text-ParseWords'}, {'scheme': 'package', 'title': 'gpm-libs'}, {'scheme': 'package', 'title': 'perl-LWP-MediaTypes'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Zlib'}, {'scheme': 'package', 'title': 'perl-TermReadKey'}, {'scheme': 'package', 'title': 'perl-threads'}, {'scheme': 'package', 'title': 'perl-File-Listing'}, {'scheme': 'package', 'title': 'rubygem-rdoc'}, {'scheme': 'package', 'title': 'perl-Scalar-List-Utils'}, {'scheme': 'package', 'title': 'perl-HTTP-Tiny'}, {'scheme': 'package', 'title': 'perl-XML-SAX'}, {'scheme': 'package', 'title': 'perl-LWP-Protocol-https'}, {'scheme': 'package', 'title': 'vim-filesystem'}, {'scheme': 'package', 'title': 'perl-IO-Zlib'}, {'scheme': 'package', 'title': 'rng-tools'}, {'scheme': 'package', 'title': 'libpciaccess'}, {'scheme': 'package', 'title': 'perl-Mozilla-CA'}, {'scheme': 'package', 'title': 'python-firewall'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'perl-threads-shared'}, {'scheme': 'package', 'title': 'mailcap'}, {'scheme': 'package', 'title': 'perl-Business-ISBN-Data'}, {'scheme': 'package', 'title': 'perl-Encode'}, {'scheme': 'package', 'title': 'perl-Carp'}, {'scheme': 'package', 'title': 'linux-firmware'}, {'scheme': 'package', 'title': 'perl-HTTP-Negotiate'}, {'scheme': 'package', 'title': 'rubygem-io-console'}, {'scheme': 'package', 'title': 'perl-Data-Dumper'}, {'scheme': 'package', 'title': 'perl-Exporter'}, {'scheme': 'package', 'title': 'aic94xx-firmware'}, {'scheme': 'package', 'title': 'wget'}, {'scheme': 'package', 'title': 'vim-enhanced'}, {'scheme': 'package', 'title': 'perl-libwww-perl'}, {'scheme': 'package', 'title': 'perl-URI'}, {'scheme': 'package', 'title': 'perl-Module-Load'}, {'scheme': 'package', 'title': 'perl-XML-LibXML'}, {'scheme': 'package', 'title': 'perl-File-Path'}, {'scheme': 'package', 'title': 'perl-Encode-Locale'}, {'scheme': 'package', 'title': 'perl-XML-SAX-Base'}, {'scheme': 'package', 'title': 'perl-XML-Parser'}, {'scheme': 'package', 'title': 'iprutils'}, {'scheme': 'package', 'title': 'biosdevname'}, {'scheme': 'package', 'title': 'perl-FCGI'}, {'scheme': 'package', 'title': 'perl-TimeDate'}, {'scheme': 'package', 'title': 'mokutil'}, {'scheme': 'package', 'title': 'git'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Bzip2'}, {'scheme': 'package', 'title': 'perl'}, {'scheme': 'package', 'title': 'perl-Font-AFM'}, {'scheme': 'package', 'title': 'fxload'}, {'scheme': 'package', 'title': 'perl-Storable'}, {'scheme': 'package', 'title': 'perl-Digest-MD5'}, {'scheme': 'package', 'title': 'plymouth-core-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'perl-Getopt-Long'}, {'scheme': 'package', 'title': 'perl-HTML-Tree'}, {'scheme': 'package', 'title': 'perl-IO-HTML'}, {'scheme': 'package', 'title': 'ruby'}, {'scheme': 'package', 'title': 'perl-PathTools'}, {'scheme': 'package', 'title': 'perl-HTML-Parser'}, {'scheme': 'package', 'title': 'ipset-libs'}, {'scheme': 'package', 'title': 'perl-Net-LibIDN'}, {'scheme': 'package', 'title': 'perl-Git'}, {'scheme': 'package', 'title': 'firewalld'}, {'scheme': 'package', 'title': 'plymouth'}, {'scheme': 'package', 'title': 'perl-CGI'}, {'scheme': 'package', 'title': 'python3-setuptools'}, {'scheme': 'package', 'title': 'perl-WWW-RobotRules'}, {'scheme': 'package', 'title': 'firewalld-filesystem'}, {'scheme': 'package', 'title': 'shim-x64'}, {'scheme': 'package', 'title': 'ruby-irb'}, {'scheme': 'package', 'title': 'perl-Pod-Simple'}, {'scheme': 'package', 'title': 'perl-Error'}, {'scheme': 'package', 'title': 'perl-HTML-Format'}, {'scheme': 'package', 'title': 'lsscsi'}, {'scheme': 'package', 'title': 'perl-HTTP-Daemon'}, {'scheme': 'package', 'title': 'alsa-lib'}, {'scheme': 'package', 'title': 'redhat-logos'}, {'scheme': 'package', 'title': 'rubygem-json'}, {'scheme': 'package', 'title': 'perl-Date-Manip'}, {'scheme': 'package', 'title': 'perl-Net-HTTP'}, {'scheme': 'package', 'title': 'perl-Digest'}, {'scheme': 'package', 'title': 'perl-IO-Socket-SSL'}, {'scheme': 'package', 'title': 'ebtables'}, {'scheme': 'package', 'title': 'plymouth-scripts'}, {'scheme': 'package', 'title': 'perl-IO-stringy'}, {'scheme': 'package', 'title': 'time'}, {'scheme': 'package', 'title': 'perl-podlators'}, {'scheme': 'package', 'title': 'perl-constant'}, {'scheme': 'package', 'title': 'perl-Pod-Escapes'}, {'scheme': 'package', 'title': 'perl-Net-SSLeay'}, {'scheme': 'package', 'title': 'perl-Business-ISBN'}, {'scheme': 'package', 'title': 'alsa-tools-firmware'}, {'scheme': 'package', 'title': 'perl-Filter'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'perl-Pod-Usage'}, {'scheme': 'package', 'title': 'python-slip'}, {'scheme': 'package', 'title': 'alsa-firmware'}, {'scheme': 'package', 'title': 'perl-IO-Socket-IP'}, {'scheme': 'package', 'title': 'python3-pip'}, {'scheme': 'repository', 'title': 'rhel-Server'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': '906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:36:14.950897Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2025-11-13T21:36:14.988434Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': '4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:36:14.988434Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2025-11-13T21:36:15.403889Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': '79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:36:15.403889Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2025-11-13T21:36:15.447311Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': 'd3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:36:15.447311Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['sanity'], 'title': 'Packages not signed by Red Hat found on the system', 'timeStamp': '2025-11-13T21:36:15.891681Z', 'hostname': 'managed-node01', 'actor': 'red_hat_signed_rpm_check', 'summary': 'The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel', 'audience': 'sysadmin', 'key': '13f0791ae5f19f50e7d0d606fb6501f91b1efb2c', 'id': 'd5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:36:15.891681Z", "title": "Packages not signed by Red Hat found on the system"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | End execution of playbook if no entry found in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:33 ok: [managed-node01] => {"ansible_facts": {"leapp_report_missing": true}, "changed": false, "failed_when_result": false} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Parse summary to obtain list of modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:38 ok: [managed-node01] => {"ansible_facts": {"unsupported_modules": ["pata_acpi"]}, "changed": false} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Print unsupported modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:43 ok: [managed-node01] => { "unsupported_modules": [ "pata_acpi" ] } TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Unload unsupported modules] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:47 An exception occurred during task execution. To see the full traceback, use -vvv. The error was: SyntaxError: invalid syntax failed: [managed-node01] (item=pata_acpi) => {"ansible_loop_var": "item", "changed": true, "item": "pata_acpi", "module_stderr": "Shared connection to 10.31.13.13 closed.\r\n", "module_stdout": "Traceback (most recent call last):\r\n File \"/root/.ansible/tmp/ansible-tmp-1763069840.2086236-7342-279369367346029/AnsiballZ_modprobe.py\", line 107, in \r\n _ansiballz_main()\r\n File \"/root/.ansible/tmp/ansible-tmp-1763069840.2086236-7342-279369367346029/AnsiballZ_modprobe.py\", line 99, in _ansiballz_main\r\n invoke_module(zipped_mod, temp_path, ANSIBALLZ_PARAMS)\r\n File \"/root/.ansible/tmp/ansible-tmp-1763069840.2086236-7342-279369367346029/AnsiballZ_modprobe.py\", line 48, in invoke_module\r\n run_name='__main__', alter_sys=True)\r\n File \"/usr/lib64/python2.7/runpy.py\", line 170, in run_module\r\n mod_name, loader, code, fname = _get_module_details(mod_name)\r\n File \"/usr/lib64/python2.7/runpy.py\", line 113, in _get_module_details\r\n code = loader.get_code(mod_name)\r\n File \"/tmp/ansible_community.general.modprobe_payload_JksJQf/ansible_community.general.modprobe_payload.zip/ansible_collections/community/general/plugins/modules/modprobe.py\", line 109\r\n self.re_find_module = re.compile(rf\"^ *{self.name} *(?:[#;].*)?\\n?\\Z\")\r\n ^\r\nSyntaxError: invalid syntax\r\n", "msg": "MODULE FAILURE\nSee stdout/stderr for the exact error", "rc": 1} TASK [infra.leapp.remediate : leapp_loaded_removed_kernel_drivers | Continue when leapp report is missing] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_loaded_removed_kernel_drivers.yml:56 ok: [managed-node01] => { "msg": "Leapp report missing or did not contain any matches. Skipping this task." } TASK [infra.leapp.remediate : leapp_nfs_detected | Check that the leapp-report.json exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:7 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1763069836.7686286, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 72, "charset": "us-ascii", "checksum": "a2b0e942ef3435ce604608f73c4f5415e085d0ea", "ctime": 1763069776.6732874, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 16778516, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1763069776.6732874, "nlink": 1, "path": "/var/log/leapp/leapp-report.json", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 35684, "uid": 0, "version": "18446744073404096205", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.remediate : leapp_nfs_detected | End play if no leapp report exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:12 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : leapp_nfs_detected | Read leapp report] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:18 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "2cf3d3a2-f69f-4a9d-8f36-b2fdee67cb59", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-11-13T21:35:58.009276Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-11-13T21:36:11.602236Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", 
      "severity": "high"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:36:12.354700Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", 
      "severity": "low"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-11-13T21:36:12.403805Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", 
      "severity": "high"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-11-13T21:36:12.525702Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-11-13T21:36:12.529280Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", 
      "severity": "low"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-11-13T21:36:12.645594Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", 
      "severity": "high"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:36:12.828053Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", 
      "severity": "low"
    }, 
    {
      "groups": [
        "filesystem", 
        "network", 
        "inhibitor"
      ], 
      "title": "Use of NFS detected. Upgrade can't proceed", 
      "timeStamp": "2025-11-13T21:36:12.870521Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "file", 
            "title": "/etc/fstab"
          }
        ], 
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6964006", 
            "title": "Why does leapp upgrade fail on detecting NFS during upgrade?"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Disable NFS temporarily for the upgrade if possible."
          }
        ]
      }, 
      "actor": "check_nfs", 
      "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", 
      "audience": "sysadmin", 
      "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", 
      "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", 
      "severity": "high"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-11-13T21:36:13.410338Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", 
      "severity": "low"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-11-13T21:36:14.287417Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-11-13T21:36:14.950897Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Twig"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tagset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-parent"
          }, 
          {
            "scheme": "package", 
            "title": "efivar-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-HiRes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Cookies"
          }, 
          {
            "scheme": "package", 
            "title": "vim-common"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Perldoc"
          }, 
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "perl-macros"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Compress"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip-dbus"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Date"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-NamespaceSupport"
          }, 
          {
            "scheme": "package", 
            "title": "rubygems"
          }, 
          {
            "scheme": "package", 
            "title": "grub2-efi-x64-modules"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Message"
          }, 
          {
            "scheme": "package", 
            "title": "ipset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Socket"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-psych"
          }, 
          {
            "scheme": "package", 
            "title": "libdrm"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-Local"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-bigdecimal"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Temp"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Text-ParseWords"
          }, 
          {
            "scheme": "package", 
            "title": "gpm-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-MediaTypes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TermReadKey"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Listing"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-rdoc"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Scalar-List-Utils"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Tiny"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-Protocol-https"
          }, 
          {
            "scheme": "package", 
            "title": "vim-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "rng-tools"
          }, 
          {
            "scheme": "package", 
            "title": "libpciaccess"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Mozilla-CA"
          }, 
          {
            "scheme": "package", 
            "title": "python-firewall"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads-shared"
          }, 
          {
            "scheme": "package", 
            "title": "mailcap"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN-Data"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Carp"
          }, 
          {
            "scheme": "package", 
            "title": "linux-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Negotiate"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-io-console"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Data-Dumper"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Exporter"
          }, 
          {
            "scheme": "package", 
            "title": "aic94xx-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "wget"
          }, 
          {
            "scheme": "package", 
            "title": "vim-enhanced"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libwww-perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-URI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Module-Load"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-LibXML"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Path"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode-Locale"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX-Base"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "iprutils"
          }, 
          {
            "scheme": "package", 
            "title": "biosdevname"
          }, 
          {
            "scheme": "package", 
            "title": "perl-FCGI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TimeDate"
          }, 
          {
            "scheme": "package", 
            "title": "mokutil"
          }, 
          {
            "scheme": "package", 
            "title": "git"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Bzip2"
          }, 
          {
            "scheme": "package", 
            "title": "perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Font-AFM"
          }, 
          {
            "scheme": "package", 
            "title": "fxload"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Storable"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest-MD5"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-core-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Getopt-Long"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tree"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-HTML"
          }, 
          {
            "scheme": "package", 
            "title": "ruby"
          }, 
          {
            "scheme": "package", 
            "title": "perl-PathTools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "ipset-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-LibIDN"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Git"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth"
          }, 
          {
            "scheme": "package", 
            "title": "perl-CGI"
          }, 
          {
            "scheme": "package", 
            "title": "python3-setuptools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-WWW-RobotRules"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "shim-x64"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-irb"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Simple"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Error"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Format"
          }, 
          {
            "scheme": "package", 
            "title": "lsscsi"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Daemon"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-lib"
          }, 
          {
            "scheme": "package", 
            "title": "redhat-logos"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-json"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Date-Manip"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-HTTP"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-SSL"
          }, 
          {
            "scheme": "package", 
            "title": "ebtables"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-scripts"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-stringy"
          }, 
          {
            "scheme": "package", 
            "title": "time"
          }, 
          {
            "scheme": "package", 
            "title": "perl-podlators"
          }, 
          {
            "scheme": "package", 
            "title": "perl-constant"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Escapes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-SSLeay"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-tools-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Filter"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Usage"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-IP"
          }, 
          {
            "scheme": "package", 
            "title": "python3-pip"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel-Server"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", 
      "severity": "low"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-11-13T21:36:14.988434Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", 
      "severity": "high"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-11-13T21:36:15.403889Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-11-13T21:36:15.447311Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "sanity"
      ], 
      "title": "Packages not signed by Red Hat found on the system", 
      "timeStamp": "2025-11-13T21:36:15.891681Z", 
      "hostname": "managed-node01", 
      "actor": "red_hat_signed_rpm_check", 
      "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", 
      "audience": "sysadmin", 
      "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", 
      "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", 
      "severity": "high"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.remediate : leapp_nfs_detected | Parse leapp report to json] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:23 ok: [managed-node01] => {"ansible_facts": {"leappreportdata": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:35:58.009276Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:36:11.602236Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:36:12.354700Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:36:12.525702Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:36:12.529280Z", "title": "SElinux will be set to permissive mode"}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:36:12.645594Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:36:12.828053Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:36:13.410338Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:36:14.287417Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:36:14.950897Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:36:14.988434Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:36:15.403889Z", "title": "chrony using default configuration"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:36:15.447311Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:36:15.891681Z", "title": "Packages not signed by Red Hat found on the system"}], "leapp_run_id": "2cf3d3a2-f69f-4a9d-8f36-b2fdee67cb59"}}, "changed": false} TASK [infra.leapp.remediate : leapp_nfs_detected | Find matching entries] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:27 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2025-11-13T21:35:58.009276Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': 'e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "e5b13b365214349346f38ed1a3035f4ad2eb260ec57c69d970f412baf8a82594", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:35:58.009276Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-11-13T21:36:11.602236Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': '77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "77ee2c37394fcaaf3f5816c0b5f1417110970104f1c1a2be5144e69d6a0b4b16", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:36:11.602236Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:36:12.354700Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': '781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "781673f330db7aa22120e39623ac0048ec537727ec59e620897fd364fe9e0a58", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:36:12.354700Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2025-11-13T21:36:12.403805Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': '7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2025-11-13T21:36:12.525702Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': '5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "5013dd8ef1cb003748959ce3a0fb1e3eed6a26cb31aa7a64ccac1c1b8fba9a4f", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:36:12.525702Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2025-11-13T21:36:12.529280Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': '159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "159d501593572e7fc1cf8a8acddb0b1bd16e470be4e183498ada070a70c4fc6a", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:36:12.529280Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2025-11-13T21:36:12.645594Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': 'cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "cafb38a18652438e5701b2893c4015edeca360e26aebb154c6497b74999c0852", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:36:12.645594Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:36:12.828053Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "7cb84decd33327e452413ca4bf9fe758d1d7dc685e23896459c15e2084886d58", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:36:12.828053Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['filesystem', 'network', 'inhibitor'], 'title': "Use of NFS detected. Upgrade can't proceed", 'timeStamp': '2025-11-13T21:36:12.870521Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'file', 'title': '/etc/fstab'}], 'external': [{'url': 'https://access.redhat.com/solutions/6964006', 'title': 'Why does leapp upgrade fail on detecting NFS during upgrade?'}], 'remediations': [{'type': 'hint', 'context': 'Disable NFS temporarily for the upgrade if possible.'}]}, 'actor': 'check_nfs', 'summary': 'NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n', 'audience': 'sysadmin', 'key': '9881b25faceeeaa7a6478bcdac29afd7f6baaaed', 'id': '9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4', 'severity': 'high'}) => {"ansible_facts": {"summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n"}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2025-11-13T21:36:13.410338Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': 'ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "ab8948559af79ba8eb981c6c3e559295d131c97484d730e72a037d291bc9a483", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:36:13.410338Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2025-11-13T21:36:14.287417Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': 'c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "c31de4e40d63c7a7ebbea65083f4cd67018fa521d2b43ead5000f97384e996f0", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:36:14.287417Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2025-11-13T21:36:14.950897Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-libs'}, {'scheme': 'package', 'title': 'perl-libs'}, {'scheme': 'package', 'title': 'perl-XML-Twig'}, {'scheme': 'package', 'title': 'perl-HTML-Tagset'}, {'scheme': 'package', 'title': 'perl-parent'}, {'scheme': 'package', 'title': 'efivar-libs'}, {'scheme': 'package', 'title': 'perl-Time-HiRes'}, {'scheme': 'package', 'title': 'perl-HTTP-Cookies'}, {'scheme': 'package', 'title': 'vim-common'}, {'scheme': 'package', 'title': 'perl-Pod-Perldoc'}, {'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'perl-macros'}, {'scheme': 'package', 'title': 'perl-IO-Compress'}, {'scheme': 'package', 'title': 'python-slip-dbus'}, {'scheme': 'package', 'title': 'perl-HTTP-Date'}, {'scheme': 'package', 'title': 'ruby-libs'}, {'scheme': 'package', 'title': 'perl-XML-NamespaceSupport'}, {'scheme': 'package', 'title': 'rubygems'}, {'scheme': 'package', 'title': 'grub2-efi-x64-modules'}, {'scheme': 'package', 'title': 'perl-HTTP-Message'}, {'scheme': 'package', 'title': 'ipset'}, {'scheme': 'package', 'title': 'perl-Socket'}, {'scheme': 'package', 'title': 'rubygem-psych'}, {'scheme': 'package', 'title': 'libdrm'}, {'scheme': 'package', 'title': 'perl-Time-Local'}, {'scheme': 'package', 'title': 'rubygem-bigdecimal'}, {'scheme': 'package', 'title': 'perl-File-Temp'}, {'scheme': 'package', 'title': 'python3'}, {'scheme': 'package', 'title': 'perl-Text-ParseWords'}, {'scheme': 'package', 'title': 'gpm-libs'}, {'scheme': 'package', 'title': 'perl-LWP-MediaTypes'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Zlib'}, {'scheme': 'package', 'title': 'perl-TermReadKey'}, {'scheme': 'package', 'title': 'perl-threads'}, {'scheme': 'package', 'title': 'perl-File-Listing'}, {'scheme': 'package', 'title': 'rubygem-rdoc'}, {'scheme': 'package', 'title': 'perl-Scalar-List-Utils'}, {'scheme': 'package', 'title': 'perl-HTTP-Tiny'}, {'scheme': 'package', 'title': 'perl-XML-SAX'}, {'scheme': 'package', 'title': 'perl-LWP-Protocol-https'}, {'scheme': 'package', 'title': 'vim-filesystem'}, {'scheme': 'package', 'title': 'perl-IO-Zlib'}, {'scheme': 'package', 'title': 'rng-tools'}, {'scheme': 'package', 'title': 'libpciaccess'}, {'scheme': 'package', 'title': 'perl-Mozilla-CA'}, {'scheme': 'package', 'title': 'python-firewall'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'perl-threads-shared'}, {'scheme': 'package', 'title': 'mailcap'}, {'scheme': 'package', 'title': 'perl-Business-ISBN-Data'}, {'scheme': 'package', 'title': 'perl-Encode'}, {'scheme': 'package', 'title': 'perl-Carp'}, {'scheme': 'package', 'title': 'linux-firmware'}, {'scheme': 'package', 'title': 'perl-HTTP-Negotiate'}, {'scheme': 'package', 'title': 'rubygem-io-console'}, {'scheme': 'package', 'title': 'perl-Data-Dumper'}, {'scheme': 'package', 'title': 'perl-Exporter'}, {'scheme': 'package', 'title': 'aic94xx-firmware'}, {'scheme': 'package', 'title': 'wget'}, {'scheme': 'package', 'title': 'vim-enhanced'}, {'scheme': 'package', 'title': 'perl-libwww-perl'}, {'scheme': 'package', 'title': 'perl-URI'}, {'scheme': 'package', 'title': 'perl-Module-Load'}, {'scheme': 'package', 'title': 'perl-XML-LibXML'}, {'scheme': 'package', 'title': 'perl-File-Path'}, {'scheme': 'package', 'title': 'perl-Encode-Locale'}, {'scheme': 'package', 'title': 'perl-XML-SAX-Base'}, {'scheme': 'package', 'title': 'perl-XML-Parser'}, {'scheme': 'package', 'title': 'iprutils'}, {'scheme': 'package', 'title': 'biosdevname'}, {'scheme': 'package', 'title': 'perl-FCGI'}, {'scheme': 'package', 'title': 'perl-TimeDate'}, {'scheme': 'package', 'title': 'mokutil'}, {'scheme': 'package', 'title': 'git'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Bzip2'}, {'scheme': 'package', 'title': 'perl'}, {'scheme': 'package', 'title': 'perl-Font-AFM'}, {'scheme': 'package', 'title': 'fxload'}, {'scheme': 'package', 'title': 'perl-Storable'}, {'scheme': 'package', 'title': 'perl-Digest-MD5'}, {'scheme': 'package', 'title': 'plymouth-core-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'perl-Getopt-Long'}, {'scheme': 'package', 'title': 'perl-HTML-Tree'}, {'scheme': 'package', 'title': 'perl-IO-HTML'}, {'scheme': 'package', 'title': 'ruby'}, {'scheme': 'package', 'title': 'perl-PathTools'}, {'scheme': 'package', 'title': 'perl-HTML-Parser'}, {'scheme': 'package', 'title': 'ipset-libs'}, {'scheme': 'package', 'title': 'perl-Net-LibIDN'}, {'scheme': 'package', 'title': 'perl-Git'}, {'scheme': 'package', 'title': 'firewalld'}, {'scheme': 'package', 'title': 'plymouth'}, {'scheme': 'package', 'title': 'perl-CGI'}, {'scheme': 'package', 'title': 'python3-setuptools'}, {'scheme': 'package', 'title': 'perl-WWW-RobotRules'}, {'scheme': 'package', 'title': 'firewalld-filesystem'}, {'scheme': 'package', 'title': 'shim-x64'}, {'scheme': 'package', 'title': 'ruby-irb'}, {'scheme': 'package', 'title': 'perl-Pod-Simple'}, {'scheme': 'package', 'title': 'perl-Error'}, {'scheme': 'package', 'title': 'perl-HTML-Format'}, {'scheme': 'package', 'title': 'lsscsi'}, {'scheme': 'package', 'title': 'perl-HTTP-Daemon'}, {'scheme': 'package', 'title': 'alsa-lib'}, {'scheme': 'package', 'title': 'redhat-logos'}, {'scheme': 'package', 'title': 'rubygem-json'}, {'scheme': 'package', 'title': 'perl-Date-Manip'}, {'scheme': 'package', 'title': 'perl-Net-HTTP'}, {'scheme': 'package', 'title': 'perl-Digest'}, {'scheme': 'package', 'title': 'perl-IO-Socket-SSL'}, {'scheme': 'package', 'title': 'ebtables'}, {'scheme': 'package', 'title': 'plymouth-scripts'}, {'scheme': 'package', 'title': 'perl-IO-stringy'}, {'scheme': 'package', 'title': 'time'}, {'scheme': 'package', 'title': 'perl-podlators'}, {'scheme': 'package', 'title': 'perl-constant'}, {'scheme': 'package', 'title': 'perl-Pod-Escapes'}, {'scheme': 'package', 'title': 'perl-Net-SSLeay'}, {'scheme': 'package', 'title': 'perl-Business-ISBN'}, {'scheme': 'package', 'title': 'alsa-tools-firmware'}, {'scheme': 'package', 'title': 'perl-Filter'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'perl-Pod-Usage'}, {'scheme': 'package', 'title': 'python-slip'}, {'scheme': 'package', 'title': 'alsa-firmware'}, {'scheme': 'package', 'title': 'perl-IO-Socket-IP'}, {'scheme': 'package', 'title': 'python3-pip'}, {'scheme': 'repository', 'title': 'rhel-Server'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': '906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "906fa24e1ecfd0ab9af60ad4f65bf3726c53c1e360ce38537cfe93f3398de164", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:36:14.950897Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2025-11-13T21:36:14.988434Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': '4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4f9748aeffd7c69d44d3ca3145d86df16dca13637a486e03bf45510349092b39", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:36:14.988434Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2025-11-13T21:36:15.403889Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': '79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "79cd4351883fdbc2387d74e309f3c9b7ff7c52461b4a33084e7f094548887f48", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:36:15.403889Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2025-11-13T21:36:15.447311Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': 'd3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "d3f34251f93f619dde2daeacd61be1c50af0be41d1a66e1846a14aebee30c6e7", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:36:15.447311Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['sanity'], 'title': 'Packages not signed by Red Hat found on the system', 'timeStamp': '2025-11-13T21:36:15.891681Z', 'hostname': 'managed-node01', 'actor': 'red_hat_signed_rpm_check', 'summary': 'The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel', 'audience': 'sysadmin', 'key': '13f0791ae5f19f50e7d0d606fb6501f91b1efb2c', 'id': 'd5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "d5f343a92ea660d795b4f778a1eca5d553380a911c1853ea1468a7fb7e78f6bd", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:36:15.891681Z", "title": "Packages not signed by Red Hat found on the system"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.remediate : leapp_nfs_detected | End execution of playbook if no entry found in leapp report] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:33 ok: [managed-node01] => {"ansible_facts": {"leapp_report_missing": true}, "changed": false, "failed_when_result": false} TASK [infra.leapp.remediate : leapp_nfs_detected | Split summary] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:38 ok: [managed-node01] => {"ansible_facts": {"split_summary": ["- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n"]}, "changed": false} TASK [infra.leapp.remediate : leapp_nfs_detected | Get fstab_entries] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:41 ok: [managed-node01] => (item=- NFS shares found in /etc/fstab: - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch ) => {"ansible_facts": {"fstab_entries": ["ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat", "nest.test.redhat.com:/mnt/qa", "vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive", "nest.test.redhat.com:/mnt/tpsdist", "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot", "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch"]}, "ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n"} TASK [infra.leapp.remediate : leapp_nfs_detected | Get nfs_mounts] ************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:46 skipping: [managed-node01] => (item=- NFS shares found in /etc/fstab: - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch ) => {"ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [infra.leapp.remediate : leapp_nfs_detected | Get systemd_mounts] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:51 skipping: [managed-node01] => (item=- NFS shares found in /etc/fstab: - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat - nest.test.redhat.com:/mnt/qa /mnt/qa - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch ) => {"ansible_loop_var": "item", "changed": false, "item": "- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "skip_reason": "Conditional result was False"} skipping: [managed-node01] => {"changed": false, "msg": "All items skipped"} TASK [infra.leapp.remediate : leapp_nfs_detected | Comment NFS shares in /etc/fstab] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:57 changed: [managed-node01] => (item=ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006260", "end": "2025-11-13 16:37:21.765528", "item": "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat", "msg": "", "rc": 0, "start": "2025-11-13 16:37:21.759268", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=nest.test.redhat.com:/mnt/qa) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"nest.test.redhat.com:/mnt/qa\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006151", "end": "2025-11-13 16:37:22.020294", "item": "nest.test.redhat.com:/mnt/qa", "msg": "", "rc": 0, "start": "2025-11-13 16:37:22.014143", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005584", "end": "2025-11-13 16:37:22.271816", "item": "vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive", "msg": "", "rc": 0, "start": "2025-11-13 16:37:22.266232", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=nest.test.redhat.com:/mnt/tpsdist) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"nest.test.redhat.com:/mnt/tpsdist\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005758", "end": "2025-11-13 16:37:22.523962", "item": "nest.test.redhat.com:/mnt/tpsdist", "msg": "", "rc": 0, "start": "2025-11-13 16:37:22.518204", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.006895", "end": "2025-11-13 16:37:22.787853", "item": "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot", "msg": "", "rc": 0, "start": "2025-11-13 16:37:22.780958", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} changed: [managed-node01] => (item=ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch) => {"ansible_loop_var": "item", "changed": true, "cmd": "set -o pipefail\nentry=\"ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch\"\ngrep -qF \"$entry\" /etc/fstab && sed -i \"s|^$entry|# $entry|\" /etc/fstab\n", "delta": "0:00:00.005827", "end": "2025-11-13 16:37:23.041127", "item": "ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch", "msg": "", "rc": 0, "start": "2025-11-13 16:37:23.035300", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.remediate : leapp_nfs_detected | Unmount NFS Mounts] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/remediate/tasks/leapp_nfs_detected.yml:66 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:41 META: triggered running handlers for managed-node01 TASK [common_upgrade_tasks | Reinstall linux-firmware via dnf (remove)] ******** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["dnf", "remove", "-y", "linux-firmware"], "delta": "0:00:01.303791", "end": "2025-11-13 16:37:24.649041", "msg": "", "rc": 0, "start": "2025-11-13 16:37:23.345250", "stderr": "", "stderr_lines": [], "stdout": "Dependencies resolved.\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nRemoving:\n linux-firmware noarch 20200421-82.git78c0348.el7_9 @System 394 M\n\nTransaction Summary\n================================================================================\nRemove 1 Package\n\nFreed space: 394 M\nRunning transaction check\nTransaction check succeeded.\nRunning transaction test\nTransaction test succeeded.\nRunning transaction\n Preparing : 1/1 \n Erasing : linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 \n Verifying : linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 \n\nRemoved:\n linux-firmware-20200421-82.git78c0348.el7_9.noarch \n\nComplete!", "stdout_lines": ["Dependencies resolved.", "================================================================================", " Package Arch Version Repository Size", "================================================================================", "Removing:", " linux-firmware noarch 20200421-82.git78c0348.el7_9 @System 394 M", "", "Transaction Summary", "================================================================================", "Remove 1 Package", "", "Freed space: 394 M", "Running transaction check", "Transaction check succeeded.", "Running transaction test", "Transaction test succeeded.", "Running transaction", " Preparing : 1/1 ", " Erasing : linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 ", " Verifying : linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 ", "", "Removed:", " linux-firmware-20200421-82.git78c0348.el7_9.noarch ", "", "Complete!"]} TASK [common_upgrade_tasks | Reinstall linux-firmware via dnf (install)] ******* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:48 ok: [managed-node01] => {"changed": false, "cmd": ["dnf", "install", "-y", "linux-firmware"], "delta": "0:00:25.302206", "end": "2025-11-13 16:37:50.215348", "msg": "", "rc": 0, "start": "2025-11-13 16:37:24.913142", "stderr": "", "stderr_lines": [], "stdout": "Beaker Client - RedHatEnterpriseLinux7Server 93 kB/s | 18 kB 00:00 \nDependencies resolved.\n================================================================================\n Package Arch Version Repository Size\n================================================================================\nInstalling:\n linux-firmware noarch 20200421-82.git78c0348.el7_9 rhel-Server 80 M\n\nTransaction Summary\n================================================================================\nInstall 1 Package\n\nTotal download size: 80 M\nInstalled size: 394 M\nDownloading Packages:\nlinux-firmware-20200421-82.git78c0348.el7_9.noa 6.6 MB/s | 80 MB 00:12 \n--------------------------------------------------------------------------------\nTotal 6.6 MB/s | 80 MB 00:12 \nRunning transaction check\nTransaction check succeeded.\nRunning transaction test\nTransaction test succeeded.\nRunning transaction\n Preparing : 1/1 \n Installing : linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 \n Running scriptlet: linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 \n Verifying : linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 \n\nInstalled:\n linux-firmware-20200421-82.git78c0348.el7_9.noarch \n\nComplete!", "stdout_lines": ["Beaker Client - RedHatEnterpriseLinux7Server 93 kB/s | 18 kB 00:00 ", "Dependencies resolved.", "================================================================================", " Package Arch Version Repository Size", "================================================================================", "Installing:", " linux-firmware noarch 20200421-82.git78c0348.el7_9 rhel-Server 80 M", "", "Transaction Summary", "================================================================================", "Install 1 Package", "", "Total download size: 80 M", "Installed size: 394 M", "Downloading Packages:", "linux-firmware-20200421-82.git78c0348.el7_9.noa 6.6 MB/s | 80 MB 00:12 ", "--------------------------------------------------------------------------------", "Total 6.6 MB/s | 80 MB 00:12 ", "Running transaction check", "Transaction check succeeded.", "Running transaction test", "Transaction test succeeded.", "Running transaction", " Preparing : 1/1 ", " Installing : linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 ", " Running scriptlet: linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 ", " Verifying : linux-firmware-20200421-82.git78c0348.el7_9.noarch 1/1 ", "", "Installed:", " linux-firmware-20200421-82.git78c0348.el7_9.noarch ", "", "Complete!"]} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:52 META: triggered running handlers for managed-node01 TASK [common_upgrade_tasks | Run analysis after remediation] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:55 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 38, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:21 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "65aab0579db04fb77653b6f51363dac70bcd9a56", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "c217114f4f27ea3e82d05947b9077a53", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1763069870.912993-7566-171089605951032/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:33 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:41 ok: [managed-node01] => {"changed": false, "checksum": "40eb5afb1d7d22515dc739978336696eddc582de", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/pre_ripu.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 12002, "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:49 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.381273", "end": "2025-11-13 16:37:52.701868", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:37:52.320595", "stderr": "", "stderr_lines": [], "stdout": "epel-release-7-14.noarch\ntps-devel-2.44.50-1.noarch", "stdout_lines": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:63 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:67 ok: [managed-node01] => {"changed": false, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 58, "state": "file", "uid": 0} TASK [infra.leapp.analysis : Include tasks for preupg assistant analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : Include tasks for leapp preupgrade analysis] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml for managed-node01 TASK [infra.leapp.analysis : analysis-leapp | Register to leapp activation key] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [analysis-leapp | Include custom_local_repos for local_repos_pre_leapp] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:14 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 ok: [managed-node01] => (item={'name': 'rhel-7-server-extras-rpms', 'description': 'RHEL 7 Server Extras', 'baseurl': 'https://download.eng.brq.redhat.com/rhel-7/nightly/EXTRAS-7/latest-EXTRAS-7.9-RHEL-7/compose/Server/x86_64/os/', 'file': 'rhel7_extras', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": false, "item": {"baseurl": "https://download.eng.brq.redhat.com/rhel-7/nightly/EXTRAS-7/latest-EXTRAS-7.9-RHEL-7/compose/Server/x86_64/os/", "description": "RHEL 7 Server Extras", "file": "rhel7_extras", "name": "rhel-7-server-extras-rpms", "state": "present"}, "repo": "rhel-7-server-extras-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 7] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:22 ok: [managed-node01] => {"changed": false, "changes": {"installed": [], "updated": []}, "msg": "", "rc": 0, "results": ["All packages providing leapp-upgrade are up to date", ""]} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 8] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:29 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Install packages for preupgrade analysis on RHEL 9] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:36 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.analysis : analysis-leapp | Ensure leapp log directory exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:43 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0700", "owner": "root", "path": "/var/log/leapp", "secontext": "system_u:object_r:var_log_t:s0", "size": 146, "state": "directory", "uid": 0} TASK [infra.leapp.analysis : analysis-leapp | Populate leapp_answers file] ***** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:51 changed: [managed-node01] => {"changed": true, "checksum": "3d934ad808576e3a7fb4c14a89645a4ad55ccf53", "dest": "/var/log/leapp/answerfile", "gid": 0, "group": "root", "md5sum": "01e375235c8e4cafdec593b260354063", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 48, "src": "/root/.ansible/tmp/ansible-tmp-1763069876.1757054-7684-110563907368503/source", "state": "file", "uid": 0} TASK [analysis-leapp | Create /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:60 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 changed: [managed-node01] => {"changed": true, "path": "/etc/leapp/files/leapp_upgrade_repositories.repo", "state": "absent"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 changed: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-baseos-rpms', 'description': 'BaseOS for x86_64', 'baseurl': 'http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/', 'file': '/etc/leapp/files/leapp_upgrade_repositories', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/", "description": "BaseOS for x86_64", "file": "/etc/leapp/files/leapp_upgrade_repositories", "name": "rhel-8-for-x86_64-baseos-rpms", "state": "present"}, "repo": "rhel-8-for-x86_64-baseos-rpms", "state": "present"} changed: [managed-node01] => (item={'name': 'rhel-8-for-x86_64-appstream-rpms', 'description': 'AppStream for x86_64', 'baseurl': 'http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/', 'file': '/etc/leapp/files/leapp_upgrade_repositories', 'state': 'present'}) => {"ansible_loop_var": "item", "changed": true, "item": {"baseurl": "http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/", "description": "AppStream for x86_64", "file": "/etc/leapp/files/leapp_upgrade_repositories", "name": "rhel-8-for-x86_64-appstream-rpms", "state": "present"}, "repo": "rhel-8-for-x86_64-appstream-rpms", "state": "present"} TASK [infra.leapp.analysis : analysis-leapp | Leapp preupgrade report] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:71 ASYNC FAILED on managed-node01: jid=j369856111818.16070 changed: [managed-node01] => {"ansible_job_id": "j369856111818.16070", "changed": true, "cmd": "set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log\n", "delta": "0:00:39.483824", "end": "2025-11-13 16:38:37.354529", "failed_when_result": false, "finished": 1, "msg": "non-zero return code", "rc": 1, "results_file": "/root/.ansible_async/j369856111818.16070", "start": "2025-11-13 16:37:57.870705", "started": 1, "stderr": "", "stderr_lines": [], "stdout": "==> Processing phase `configuration_phase`\n====> * ipu_workflow_config\n IPU workflow config actor\n==> Processing phase `FactsCollection`\n====> * get_enabled_modules\n Provides data about which module streams are enabled on the source system.\n====> * system_facts\n Provides data about many facts from system.\n====> * sctp_read_status\n Determines whether or not the SCTP kernel module might be wanted.\n====> * tcp_wrappers_config_read\n Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.\n====> * scandasd\n In case of s390x architecture, check whether DASD is used.\n====> * removed_pam_modules_scanner\n Scan PAM configuration for modules that are not available in RHEL-8.\n====> * storage_scanner\n Provides data about storage settings.\n====> * scanzfcp\n In case of s390x architecture, check whether ZFCP is used.\n====> * scan_systemd_source\n Provides info about systemd on the source system\n====> * repository_mapping\n Produces message containing repository mapping based on provided file.\n====> * root_scanner\n Scan the system root directory and produce a message containing\n====> * scan_kernel_cmdline\n No documentation has been provided for the scan_kernel_cmdline actor.\n====> * common_leapp_dracut_modules\n Influences the generation of the initram disk\n====> * sssd_facts\n Check SSSD configuration for changes in RHEL8 and report them in model.\n====> * rpm_scanner\n Provides data about installed RPM Packages.\n====> * trusted_gpg_keys_scanner\n Scan for trusted GPG keys.\n====> * pam_modules_scanner\n Scan the pam directory for services and modules used in them\n====> * scan_grub_config\n Scan grub configuration files for errors.\n====> * firewalld_facts_actor\n Provide data about firewalld\n====> * scan_custom_modifications_actor\n Collects information about files in leapp directories that have been modified or newly added.\n====> * scan_files_for_target_userspace\n Scan the source system and identify files that will be copied into the target userspace when it is created.\n====> * scan_custom_repofile\n Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.\n====> * satellite_upgrade_facts\n Report which Satellite packages require updates and how to handle PostgreSQL data\n====> * check_kde_apps\n Actor checks which KDE apps are installed.\n====> * check_grub_legacy\n Check whether GRUB Legacy is installed in the MBR.\n====> * load_device_driver_deprecation_data\n Loads deprecation data for drivers and devices (PCI & CPU)\n====> * transaction_workarounds\n Provides additional RPM transaction tasks based on bundled RPM packages.\n====> * selinuxcontentscanner\n Scan the system for any SELinux customizations\n====> * scanclienablerepo\n Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.\n====> * read_openssh_config\n Collect information about the OpenSSH configuration.\n====> * scan_fips\n Determine whether the source system has FIPS enabled.\n====> * detect_kernel_drivers\n Matches all currently loaded kernel drivers against known deprecated and removed drivers.\n====> * copy_dnf_conf_into_target_userspace\n Copy dnf.conf into target userspace\n====> * udevadm_info\n Produces data exported by the \"udevadm info\" command.\n====> * register_yum_adjustment\n Registers a workaround which will adjust the yum directories during the upgrade.\n====> * distribution_signed_rpm_scanner\n Provide data about distribution signed & unsigned RPM packages.\n====> * scan_target_os_image\n Scans the provided target OS ISO image to use as a content source for the IPU, if any.\n====> * scan_grub_device_name\n Find the name of the block devices where GRUB is located\n====> * scanmemory\n Scan Memory of the machine.\n====> * scan_subscription_manager_info\n Scans the current system for subscription manager information\n====> * pci_devices_scanner\n Provides data about existing PCI Devices.\n====> * source_boot_loader_scanner\n Scans the boot loader configuration on the source system.\n====> * scan_pkg_manager\n Provides data about package manager (yum/dnf)\n====> * checkrhui\n Check if system is using RHUI infrastructure (on public cloud) and send messages to\n====> * scan_sap_hana\n Gathers information related to SAP HANA instances on the system.\n====> * scan_source_files\n Scan files (explicitly specified) of the source system.\n====> * scan_source_kernel\n Scan the source system kernel.\n====> * network_manager_read_config\n Provides data about NetworkManager configuration.\n====> * authselect_scanner\n Detect what authselect configuration should be suggested to administrator.\n====> * remove_obsolete_gpg_keys\n Remove obsoleted RPM GPG keys.\n====> * persistentnetnames\n Get network interface information for physical ethernet interfaces of the original system.\n====> * xfs_info_scanner\n This actor scans all mounted mountpoints for XFS information\n====> * get_installed_desktops\n Actor checks if kde or gnome desktop environments\n====> * used_repository_scanner\n Scan used enabled repositories\n====> * scancpu\n Scan CPUs of the machine.\n====> * spamassassin_config_read\n Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the\n====> * repositories_blacklist\n Exclude target repositories provided by Red Hat without support.\n====> * scan_grub_device_partition_layout\n Scan all identified GRUB devices for their partition layout.\n====> * vsftpd_config_read\n Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.\n====> * rpm_transaction_config_tasks_collector\n Provides additional RPM transaction tasks from /etc/leapp/transaction.\n====> * biosdevname\n Enable biosdevname on the target RHEL system if all interfaces on the source RHEL\n====> * ipa_scanner\n Scan system for ipa-client and ipa-server status\n====> * quagga_daemons\n Active quagga daemons check.\n====> * multipath_conf_read\n Read multipath configuration files and extract the necessary information\n====> * cups_scanner\n Gather facts about CUPS features which needs to be migrated\n====> * scan_dynamic_linker_configuration\n Scan the dynamic linker configuration and find modifications.\n====> * persistentnetnamesdisable\n Disable systemd-udevd persistent network naming on machine with single eth0 NIC\n====> * pes_events_scanner\n Provides data about package events from Package Evolution Service.\n====> * setuptargetrepos\n Produces list of repositories that should be available to be used by Upgrade process.\n==> Processing phase `Checks`\n====> * python_inform_user\n This actor informs the user of differences in Python version and support in RHEL 8.\n====> * sctp_checks\n Parses collected SCTP information and take necessary actions.\n====> * check_os_release\n Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.\n====> * powertop\n Check if PowerTOP is installed. If yes, write information about non-compatible changes.\n====> * check_openssl_conf\n Check whether the openssl configuration and openssl-IBMCA.\n====> * checkmemory\n The actor check the size of RAM against RHEL8 minimal hardware requirements\n====> * check_bind\n Actor parsing BIND configuration and checking for known issues in it.\n====> * check_sap_hana\n If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.\n====> * cephvolumescan\n Retrieves the list of encrypted Ceph OSD\n====> * check_mount_options\n Check for mount options preventing the upgrade.\n====> * check_root_symlinks\n Check if the symlinks /bin and /lib are relative, not absolute.\n====> * checkirssi\n Check if irssi is installed. If yes, write information about non-compatible changes.\n====> * multiple_package_versions\n Check for problematic 32bit packages installed together with 64bit ones.\n====> * check_se_linux\n Check SELinux status and produce decision messages for further action.\n====> * authselect_check\n Confirm suggested authselect call from AuthselectScanner.\n====> * check_memcached\n Check for incompatible changes in memcached configuration.\n====> * check_system_arch\n Check if system is running at a supported architecture. If no, inhibit the upgrade process.\n====> * check_ha_cluster\n Check if HA Cluster is in use. If yes, inhibit the upgrade process.\n====> * bacula_check\n Actor checking for presence of Bacula installation.\n====> * unsupported_upgrade_check\n Checks environment variables and produces a warning report if the upgrade is unsupported.\n====> * check_persistent_mounts\n Check if mounts required to be persistent are mounted in persistent fashion.\n====> * check_grub_core\n Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core\n====> * cups_check\n Reports changes in configuration between CUPS 1.6.3 and 2.2.6\n====> * removed_pam_modules\n Check for modules that are not available in RHEL 8 anymore\n====> * check_ntp\n Check if ntp and/or ntpdate configuration needs to be migrated.\n====> * check_removed_envvars\n Check for usage of removed environment variables and inhibit the upgrade\n====> * multipath_conf_check\n Checks whether the multipath configuration can be updated to RHEL-8 and\n====> * check_first_partition_offset\n Check whether the first partition starts at the offset >=1MiB.\n====> * check_detected_devices_and_drivers\n Checks whether or not detected devices and drivers are usable on the target system.\n====> * checkacpid\n Check if acpid is installed. If yes, write information about non-compatible changes.\n====> * check_nfs\n Check if NFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * quagga_report\n Checking for babeld on RHEL-7.\n====> * open_ssh_use_privilege_separation\n UsePrivilegeSeparation configuration option was removed.\n====> * checktargetrepos\n Check whether target yum repositories are specified.\n====> * satellite_upgrade_check\n Check state of Satellite system before upgrade\n====> * check_insights_auto_register\n Checks if system can be automatically registered into Red Hat Insights\n====> * enable_device_cio_free_service\n Enables device_cio_free.service systemd service on s390x\n====> * check_rhsmsku\n Ensure the system is subscribed to the subscription manager\n====> * check_installed_kernels\n Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.\n====> * check_etc_releasever\n Check releasever info and provide a guidance based on the facts\n====> * check_btrfs\n Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.\n====> * check_wireshark\n Report a couple of changes in tshark usage\n====> * open_ssh_deprecated_directives_check\n Check for any deprecated directives in the OpenSSH configuration.\n====> * check_fips\n Inhibit upgrade if FIPS is detected as enabled.\n====> * check_custom_modifications_actor\n Checks CustomModifications messages and produces a report about files in leapp directories that have been\n====> * checkdosfstools\n Check if dosfstools is installed. If yes, write information about non-compatible changes.\n====> * postgresql_check\n Actor checking for presence of PostgreSQL installation.\n====> * detect_grub_config_error\n Check grub configuration for various errors.\n====> * check_sendmail\n Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers\n====> * tcp_wrappers_check\n Check the list of packages previously compiled with TCP wrappers support\n====> * openssh_permit_root_login\n OpenSSH no longer allows root logins with password.\n====> * check_postfix\n Check if postfix is installed, check whether configuration update is needed.\n====> * check_target_iso\n Check that the provided target ISO is a valid ISO image and is located on a persistent partition.\n====> * check_fstab_mount_order\n Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.\n====> * check_docker\n Checks if Docker is installed and warns about its deprecation in RHEL8.\n====> * check_installed_devel_kernels\n Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.\n====> * checkfstabxfsoptions\n Check the FSTAB file for the deprecated / removed XFS mount options.\n====> * check_consumed_assets\n Check whether Leapp is using correct data assets.\n====> * check_chrony\n Check for incompatible changes in chrony configuration.\n====> * open_ssh_algorithms\n OpenSSH configuration does not contain any unsupported cryptographic algorithms.\n====> * check_boot_avail_space\n Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.\n====> * vsftpd_config_check\n Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that\n====> * check_systemd_broken_symlinks\n Check whether some systemd symlinks are broken\n====> * check_cifs\n Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.\n====> * sssd_check\n Check SSSD configuration for changes in RHEL8 and report them.\n====> * check_skipped_repositories\n Produces a report if any repositories enabled on the system are going to be skipped.\n====> * check_kde_gnome\n Checks whether KDE is installed\n====> * removed_pam_modules_check\n Check if it is all right to disable PAM modules that are not in RHEL-8.\n====> * check_ipa_server\n Check for ipa-server and inhibit upgrade\n====> * check_dynamic_linker_configuration\n Check for customization of dynamic linker configuration.\n====> * check_brltty\n Check if brltty is installed, check whether configuration update is needed.\n====> * check_firewalld\n Check for certain firewalld configuration that may prevent an upgrade.\n====> * zipl_check_boot_entries\n Inhibits the upgrade if a problematic Zipl configuration is detected on the system.\n====> * check_rpm_transaction_events\n Filter RPM transaction events based on installed RPM packages\n====> * check_installed_debug_kernels\n Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.\n====> * efi_check_boot\n Adjust EFI boot entry for first reboot\n====> * open_ssh_protocol\n Protocol configuration option was removed.\n====> * spamassassin_config_check\n Reports changes in spamassassin between RHEL-7 and RHEL-8\n====> * checkgrep\n Check if Grep is installed. If yes, write information about non-compatible changes.\n====> * check_yum_plugins_enabled\n Checks that the required yum plugins are enabled.\n====> * red_hat_signed_rpm_check\n Check if there are packages not signed by Red Hat in use. If yes, warn user about it.\n====> * checkhybridimage\n Check if the system is using Azure hybrid image.\n====> * check_luks_and_inhibit\n Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.\n====> * check_skip_phase\n Skip all the subsequent phases until the report phase.\n==> Processing phase `Reports`\n====> * verify_check_results\n Check all dialogs and notify that user needs to make some choices.\n====> * verify_check_results\n Check all generated results messages and notify user about them.\n\nDebug output written to /var/log/leapp/leapp-preupgrade.log\n\n============================================================\n REPORT OVERVIEW \n============================================================\n\nUpgrade has been inhibited due to the following problems:\n 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\n\nHIGH and MEDIUM severity reports:\n 1. Packages available in excluded repositories will not be installed\n 2. Difference in Python versions and support in RHEL 8\n 3. GRUB2 core will be automatically updated during the upgrade\n 4. Packages not signed by Red Hat found on the system\n 5. chrony using default configuration\n 6. Module pam_pkcs11 will be removed from PAM configuration\n\nReports summary:\n Errors: 0\n Inhibitors: 1\n HIGH severity reports: 4\n MEDIUM severity reports: 2\n LOW severity reports: 5\n INFO severity reports: 3\n\nBefore continuing, review the full report below for details about discovered problems and possible remediation instructions:\n A report has been generated at /var/log/leapp/leapp-report.txt\n A report has been generated at /var/log/leapp/leapp-report.json\n\n============================================================\n END OF REPORT OVERVIEW \n============================================================\n\nAnswerfile has been generated at /var/log/leapp/answerfile", "stdout_lines": ["==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * system_facts", " Provides data about many facts from system.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * storage_scanner", " Provides data about storage settings.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scancpu", " Scan CPUs of the machine.", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * quagga_daemons", " Active quagga daemons check.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. Difference in Python versions and support in RHEL 8", " 3. GRUB2 core will be automatically updated during the upgrade", " 4. Packages not signed by Red Hat found on the system", " 5. chrony using default configuration", " 6. Module pam_pkcs11 will be removed from PAM configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 1", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile"]} TASK [analysis-leapp | Include custom_local_repos for local_repos_post_analysis] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:89 TASK [infra.leapp.common : custom_local_repos | Remove old /etc/leapp/files/leapp_upgrade_repositories.repo] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:2 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : custom_local_repos | Enable custom upgrade yum repositories] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/custom_local_repos.yml:9 skipping: [managed-node01] => {"changed": false, "skipped_reason": "No items in the list"} TASK [infra.leapp.analysis : analysis-leapp | Include check-results-file.yml] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:97 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml for managed-node01 TASK [infra.leapp.analysis : check-results-file | Result file status] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:2 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1763069917.1489797, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 32, "charset": "us-ascii", "checksum": "bf57e00278d882f986efa70d992e8c144bbfc1a7", "ctime": 1763069917.1499796, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 16778515, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1763069917.1499796, "nlink": 1, "path": "/var/log/leapp/leapp-report.txt", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 13457, "uid": 0, "version": "371889536", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} TASK [infra.leapp.analysis : check-results-file | Check that result file exists] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/check-results-file.yml:7 ok: [managed-node01] => { "changed": false, "msg": "All assertions passed" } TASK [analysis-leapp | Run parse_leapp_report to check for inhibitors] ********* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/analysis-leapp.yml:100 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"changed": false, "content": "Risk Factor: high (inhibitor)
Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.
Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:
     - pata_acpi

Related links:
    - Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." : https://access.redhat.com/solutions/6971716
    - Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.": https://access.redhat.com/solutions/5436131
Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b
----------------------------------------
Risk Factor: high 
Title: Packages available in excluded repositories will not be installed
Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.
The list of these packages:
- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e
----------------------------------------
Risk Factor: high 
Title: Difference in Python versions and support in RHEL 8
Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python
Related links:
    - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python
Remediation: [hint] Please run "alternatives --set python /usr/bin/python3" after upgrade
Key: 0c98585b1d8d252eb540bf61560094f3495351f5
----------------------------------------
Risk Factor: high 
Title: GRUB2 core will be automatically updated during the upgrade
Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.
Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3
----------------------------------------
Risk Factor: high 
Title: Packages not signed by Red Hat found on the system
Summary: The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:
- beakerlib
- beakerlib-redhat
- epel-release
- restraint
- restraint-rhts
- tps-devel
Key: 13f0791ae5f19f50e7d0d606fb6501f91b1efb2c
----------------------------------------
Risk Factor: medium 
Title: chrony using default configuration
Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives
Key: c4222ebd18730a76f6bc7b3b66df898b106e6554
----------------------------------------
Risk Factor: medium 
Title: Module pam_pkcs11 will be removed from PAM configuration
Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.
Remediation: [hint] Configure SSSD to replace pam_pkcs11
Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3
----------------------------------------
Risk Factor: low 
Title: SElinux will be set to permissive mode
Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.
Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.
Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f
----------------------------------------
Risk Factor: low 
Title: Postfix has incompatible changes in the next major version
Summary: Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.
The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.
It can be turned on by running:  "postconf -e compatibility_level=0
It can be turned off by running: "postconf -e compatibility_level=2

In the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.

The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.

Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.

The "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.

The "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.

The "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.

The "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.

Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.

Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33
----------------------------------------
Risk Factor: low 
Title: Detected broken systemd symlinks for non-existing services
Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:
    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Remediation: [hint] Remove the invalid symlinks before the upgrade.
[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Key: be2083fee03f5f0a708fd193d82d2fe20aee7217
----------------------------------------
Risk Factor: low 
Title: Some enabled RPM repositories are unknown to Leapp
Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:
- rhel-Server
And the following packages installed from those repositories may not be upgraded:
- python3-libs
- perl-libs
- perl-XML-Twig
- perl-HTML-Tagset
- perl-parent
- efivar-libs
- perl-Time-HiRes
- perl-HTTP-Cookies
- vim-common
- perl-Pod-Perldoc
- libsolv
- perl-macros
- perl-IO-Compress
- python-slip-dbus
- perl-HTTP-Date
- ruby-libs
- perl-XML-NamespaceSupport
- rubygems
- grub2-efi-x64-modules
- perl-HTTP-Message
- ipset
- perl-Socket
- rubygem-psych
- libdrm
- perl-Time-Local
- rubygem-bigdecimal
- perl-File-Temp
- python3
- perl-Text-ParseWords
- gpm-libs
- perl-LWP-MediaTypes
- perl-Compress-Raw-Zlib
- perl-TermReadKey
- perl-threads
- perl-File-Listing
- rubygem-rdoc
- perl-Scalar-List-Utils
- perl-HTTP-Tiny
- perl-XML-SAX
- perl-LWP-Protocol-https
- vim-filesystem
- perl-IO-Zlib
- rng-tools
- libpciaccess
- perl-Mozilla-CA
- python-firewall
- json-glib
- perl-threads-shared
- mailcap
- perl-Business-ISBN-Data
- perl-Encode
- perl-Carp
- linux-firmware
- perl-HTTP-Negotiate
- rubygem-io-console
- perl-Data-Dumper
- perl-Exporter
- aic94xx-firmware
- wget
- vim-enhanced
- perl-libwww-perl
- perl-URI
- perl-Module-Load
- perl-XML-LibXML
- perl-File-Path
- perl-Encode-Locale
- perl-XML-SAX-Base
- perl-XML-Parser
- iprutils
- biosdevname
- perl-FCGI
- perl-TimeDate
- mokutil
- git
- perl-Compress-Raw-Bzip2
- perl
- perl-Font-AFM
- fxload
- perl-Storable
- perl-Digest-MD5
- plymouth-core-libs
- libreport-filesystem
- perl-Getopt-Long
- perl-HTML-Tree
- perl-IO-HTML
- ruby
- perl-PathTools
- perl-HTML-Parser
- ipset-libs
- perl-Net-LibIDN
- perl-Git
- firewalld
- plymouth
- perl-CGI
- python3-setuptools
- perl-WWW-RobotRules
- firewalld-filesystem
- shim-x64
- ruby-irb
- perl-Pod-Simple
- perl-Error
- perl-HTML-Format
- lsscsi
- perl-HTTP-Daemon
- alsa-lib
- redhat-logos
- rubygem-json
- perl-Date-Manip
- perl-Net-HTTP
- perl-Digest
- perl-IO-Socket-SSL
- ebtables
- plymouth-scripts
- perl-IO-stringy
- time
- perl-podlators
- perl-constant
- perl-Pod-Escapes
- perl-Net-SSLeay
- perl-Business-ISBN
- alsa-tools-firmware
- perl-Filter
- librepo
- perl-Pod-Usage
- python-slip
- alsa-firmware
- perl-IO-Socket-IP
- python3-pip
Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket
Key: 8e89e20c645cea600b240156071d81c64daab7ad
----------------------------------------
Risk Factor: low 
Title: Grep has incompatible changes in the next major version
Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.
The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.
In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.
When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.
The 'grep -z' no longer automatically treats the byte '\200' as binary data.
Context no longer excludes selected lines omitted because of -m. For example, 'grep "^" -m1 -A1' now outputs the first two input lines, not just the first line.

Remediation: [hint] Please update your scripts to be compatible with the changes.
Key: 94665a499e2eeee35eca3e7093a7abe183384b16
----------------------------------------
Risk Factor: info 
Title: Excluded target system repositories
Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.
- codeready-builder-beta-for-rhel-8-s390x-rpms
- codeready-builder-beta-for-rhel-8-ppc64le-rpms
- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-aarch64-eus-rpms
- codeready-builder-for-rhel-8-ppc64le-eus-rpms
- codeready-builder-beta-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-s390x-rpms
- codeready-builder-for-rhel-8-s390x-eus-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rpms
- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms
- codeready-builder-beta-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms
- codeready-builder-for-rhel-8-ppc64le-rpms
Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).
Key: 1b9132cb2362ae7830e48eee7811be9527747de8
----------------------------------------
Risk Factor: info 
Title: SElinux relabeling will be scheduled
Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.
Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72
----------------------------------------
Risk Factor: info 
Title: Current PAM and nsswitch.conf configuration will be kept.
Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.
Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c
----------------------------------------
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "4725b966-12bc-41f4-a62b-959635eb509d", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-11-13T21:38:30.162633Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "adae75813d0116f229a1cc59d60e13e441a0a1960789e5a06837ecd3147d2931", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-11-13T21:38:32.353428Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "fbd75cd39ec4b6d8581653c4535afb6456df4ca4139f75cf40c6023cded93063", 
      "severity": "high"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-11-13T21:38:32.528941Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "4e73133133dbdf92337e388bd2ab98de1e60202e5377aeca4e088a15a22fcab8", 
      "severity": "high"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-11-13T21:38:33.255643Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "dc70e688688f8b068314f79febf7f1e271f128a72e98da923c5ace04af16d663", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-11-13T21:38:33.258484Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "7ff0f73291412075bcf21d685f81bf52653e7ce5da7619639d0bb18acdacca12", 
      "severity": "low"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-11-13T21:38:33.296578Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "b5261c8423e9577351fdcd1dbd6f6c4f1e7793ad694fcad59fe4be60db08c2e6", 
      "severity": "info"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-11-13T21:38:33.650644Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "b028b9dedfaf38b64c2d2c2b2cc3ffe3e0bf5a8febc6ccdfcb0c044f2363a949", 
      "severity": "high"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-11-13T21:38:33.944151Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", 
      "severity": "high"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:38:35.401828Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "355bc4067f03556bad5eb70596899005d2edaa67080c432e95e580844df6c029", 
      "severity": "low"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-11-13T21:38:35.847942Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "dac30f248198b8463c2f5c4eeb659d3d2c4bd234a358d43a13c1f1bdcc5f2bbb", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-11-13T21:38:35.996995Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "c439366ebcb1d31cd2a1489e5adad8cd6912c75a31b797a59420a8e8e8ac5b49", 
      "severity": "low"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-11-13T21:38:36.104584Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Twig"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tagset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-parent"
          }, 
          {
            "scheme": "package", 
            "title": "efivar-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-HiRes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Cookies"
          }, 
          {
            "scheme": "package", 
            "title": "vim-common"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Perldoc"
          }, 
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "perl-macros"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Compress"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip-dbus"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Date"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-NamespaceSupport"
          }, 
          {
            "scheme": "package", 
            "title": "rubygems"
          }, 
          {
            "scheme": "package", 
            "title": "grub2-efi-x64-modules"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Message"
          }, 
          {
            "scheme": "package", 
            "title": "ipset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Socket"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-psych"
          }, 
          {
            "scheme": "package", 
            "title": "libdrm"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-Local"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-bigdecimal"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Temp"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Text-ParseWords"
          }, 
          {
            "scheme": "package", 
            "title": "gpm-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-MediaTypes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TermReadKey"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Listing"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-rdoc"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Scalar-List-Utils"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Tiny"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-Protocol-https"
          }, 
          {
            "scheme": "package", 
            "title": "vim-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "rng-tools"
          }, 
          {
            "scheme": "package", 
            "title": "libpciaccess"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Mozilla-CA"
          }, 
          {
            "scheme": "package", 
            "title": "python-firewall"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads-shared"
          }, 
          {
            "scheme": "package", 
            "title": "mailcap"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN-Data"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Carp"
          }, 
          {
            "scheme": "package", 
            "title": "linux-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Negotiate"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-io-console"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Data-Dumper"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Exporter"
          }, 
          {
            "scheme": "package", 
            "title": "aic94xx-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "wget"
          }, 
          {
            "scheme": "package", 
            "title": "vim-enhanced"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libwww-perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-URI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Module-Load"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-LibXML"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Path"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode-Locale"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX-Base"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "iprutils"
          }, 
          {
            "scheme": "package", 
            "title": "biosdevname"
          }, 
          {
            "scheme": "package", 
            "title": "perl-FCGI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TimeDate"
          }, 
          {
            "scheme": "package", 
            "title": "mokutil"
          }, 
          {
            "scheme": "package", 
            "title": "git"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Bzip2"
          }, 
          {
            "scheme": "package", 
            "title": "perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Font-AFM"
          }, 
          {
            "scheme": "package", 
            "title": "fxload"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Storable"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest-MD5"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-core-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Getopt-Long"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tree"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-HTML"
          }, 
          {
            "scheme": "package", 
            "title": "ruby"
          }, 
          {
            "scheme": "package", 
            "title": "perl-PathTools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "ipset-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-LibIDN"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Git"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth"
          }, 
          {
            "scheme": "package", 
            "title": "perl-CGI"
          }, 
          {
            "scheme": "package", 
            "title": "python3-setuptools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-WWW-RobotRules"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "shim-x64"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-irb"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Simple"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Error"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Format"
          }, 
          {
            "scheme": "package", 
            "title": "lsscsi"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Daemon"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-lib"
          }, 
          {
            "scheme": "package", 
            "title": "redhat-logos"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-json"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Date-Manip"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-HTTP"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-SSL"
          }, 
          {
            "scheme": "package", 
            "title": "ebtables"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-scripts"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-stringy"
          }, 
          {
            "scheme": "package", 
            "title": "time"
          }, 
          {
            "scheme": "package", 
            "title": "perl-podlators"
          }, 
          {
            "scheme": "package", 
            "title": "perl-constant"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Escapes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-SSLeay"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-tools-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Filter"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Usage"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-IP"
          }, 
          {
            "scheme": "package", 
            "title": "python3-pip"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel-Server"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "d66b19e3d900c6df6e90eef949c19fefec97796d88bda578a380e5b445b11a82", 
      "severity": "low"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-11-13T21:38:36.177942Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "be213252addaffdf5ff2d280d71345f58bc81c3f61c911d3a68b908b0774d305", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:38:36.720616Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "6712ac5e9241f02d1d86a30fbbf460fc08a687260dd43d7101a57b5421386000", 
      "severity": "low"
    }, 
    {
      "groups": [
        "sanity"
      ], 
      "title": "Packages not signed by Red Hat found on the system", 
      "timeStamp": "2025-11-13T21:38:36.879667Z", 
      "hostname": "managed-node01", 
      "actor": "red_hat_signed_rpm_check", 
      "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", 
      "audience": "sysadmin", 
      "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", 
      "id": "657489a37b48ea949f2f14f0c6589c80e95d4da7849c91f8d3ce257efdcec925", 
      "severity": "high"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node01] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "adae75813d0116f229a1cc59d60e13e441a0a1960789e5a06837ecd3147d2931", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:38:30.162633Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "fbd75cd39ec4b6d8581653c4535afb6456df4ca4139f75cf40c6023cded93063", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:38:32.353428Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4e73133133dbdf92337e388bd2ab98de1e60202e5377aeca4e088a15a22fcab8", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:38:32.528941Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "dc70e688688f8b068314f79febf7f1e271f128a72e98da923c5ace04af16d663", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:38:33.255643Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "7ff0f73291412075bcf21d685f81bf52653e7ce5da7619639d0bb18acdacca12", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:38:33.258484Z", "title": "SElinux will be set to permissive mode"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "b5261c8423e9577351fdcd1dbd6f6c4f1e7793ad694fcad59fe4be60db08c2e6", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:38:33.296578Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "b028b9dedfaf38b64c2d2c2b2cc3ffe3e0bf5a8febc6ccdfcb0c044f2363a949", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:38:33.650644Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:38:33.944151Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "355bc4067f03556bad5eb70596899005d2edaa67080c432e95e580844df6c029", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:38:35.401828Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "dac30f248198b8463c2f5c4eeb659d3d2c4bd234a358d43a13c1f1bdcc5f2bbb", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:38:35.847942Z", "title": "chrony using default configuration"}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "c439366ebcb1d31cd2a1489e5adad8cd6912c75a31b797a59420a8e8e8ac5b49", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:38:35.996995Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "d66b19e3d900c6df6e90eef949c19fefec97796d88bda578a380e5b445b11a82", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:38:36.104584Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "be213252addaffdf5ff2d280d71345f58bc81c3f61c911d3a68b908b0774d305", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:38:36.177942Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "6712ac5e9241f02d1d86a30fbbf460fc08a687260dd43d7101a57b5421386000", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:38:36.720616Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "657489a37b48ea949f2f14f0c6589c80e95d4da7849c91f8d3ce257efdcec925", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:38:36.879667Z", "title": "Packages not signed by Red Hat found on the system"}], "leapp_run_id": "4725b966-12bc-41f4-a62b-959635eb509d"}, "leapp_report_txt": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high ", "Title: Packages available in excluded repositories will not be installed", "Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.", "The list of these packages:", "- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e", "----------------------------------------", "Risk Factor: high ", "Title: Difference in Python versions and support in RHEL 8", "Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "Related links:", " - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python", "Remediation: [hint] Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "Key: 0c98585b1d8d252eb540bf61560094f3495351f5", "----------------------------------------", "Risk Factor: high ", "Title: GRUB2 core will be automatically updated during the upgrade", "Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3", "----------------------------------------", "Risk Factor: high ", "Title: Packages not signed by Red Hat found on the system", "Summary: The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:", "- beakerlib", "- beakerlib-redhat", "- epel-release", "- restraint", "- restraint-rhts", "- tps-devel", "Key: 13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "----------------------------------------", "Risk Factor: medium ", "Title: chrony using default configuration", "Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "Key: c4222ebd18730a76f6bc7b3b66df898b106e6554", "----------------------------------------", "Risk Factor: medium ", "Title: Module pam_pkcs11 will be removed from PAM configuration", "Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "Remediation: [hint] Configure SSSD to replace pam_pkcs11", "Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "----------------------------------------", "Risk Factor: low ", "Title: SElinux will be set to permissive mode", "Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "----------------------------------------", "Risk Factor: low ", "Title: Postfix has incompatible changes in the next major version", "Summary: Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.", "The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.", "It can be turned on by running: \"postconf -e compatibility_level=0", "It can be turned off by running: \"postconf -e compatibility_level=2", "", "In the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.", "", "The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.", "", "Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.", "", "The \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.", "", "The \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.", "", "The \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.", "", "The \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.", "", "Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.", "", "Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "----------------------------------------", "Risk Factor: low ", "Title: Detected broken systemd symlinks for non-existing services", "Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:", " - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Remediation: [hint] Remove the invalid symlinks before the upgrade.", "[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Key: be2083fee03f5f0a708fd193d82d2fe20aee7217", "----------------------------------------", "Risk Factor: low ", "Title: Some enabled RPM repositories are unknown to Leapp", "Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:", "- rhel-Server", "And the following packages installed from those repositories may not be upgraded:", "- python3-libs", "- perl-libs", "- perl-XML-Twig", "- perl-HTML-Tagset", "- perl-parent", "- efivar-libs", "- perl-Time-HiRes", "- perl-HTTP-Cookies", "- vim-common", "- perl-Pod-Perldoc", "- libsolv", "- perl-macros", "- perl-IO-Compress", "- python-slip-dbus", "- perl-HTTP-Date", "- ruby-libs", "- perl-XML-NamespaceSupport", "- rubygems", "- grub2-efi-x64-modules", "- perl-HTTP-Message", "- ipset", "- perl-Socket", "- rubygem-psych", "- libdrm", "- perl-Time-Local", "- rubygem-bigdecimal", "- perl-File-Temp", "- python3", "- perl-Text-ParseWords", "- gpm-libs", "- perl-LWP-MediaTypes", "- perl-Compress-Raw-Zlib", "- perl-TermReadKey", "- perl-threads", "- perl-File-Listing", "- rubygem-rdoc", "- perl-Scalar-List-Utils", "- perl-HTTP-Tiny", "- perl-XML-SAX", "- perl-LWP-Protocol-https", "- vim-filesystem", "- perl-IO-Zlib", "- rng-tools", "- libpciaccess", "- perl-Mozilla-CA", "- python-firewall", "- json-glib", "- perl-threads-shared", "- mailcap", "- perl-Business-ISBN-Data", "- perl-Encode", "- perl-Carp", "- linux-firmware", "- perl-HTTP-Negotiate", "- rubygem-io-console", "- perl-Data-Dumper", "- perl-Exporter", "- aic94xx-firmware", "- wget", "- vim-enhanced", "- perl-libwww-perl", "- perl-URI", "- perl-Module-Load", "- perl-XML-LibXML", "- perl-File-Path", "- perl-Encode-Locale", "- perl-XML-SAX-Base", "- perl-XML-Parser", "- iprutils", "- biosdevname", "- perl-FCGI", "- perl-TimeDate", "- mokutil", "- git", "- perl-Compress-Raw-Bzip2", "- perl", "- perl-Font-AFM", "- fxload", "- perl-Storable", "- perl-Digest-MD5", "- plymouth-core-libs", "- libreport-filesystem", "- perl-Getopt-Long", "- perl-HTML-Tree", "- perl-IO-HTML", "- ruby", "- perl-PathTools", "- perl-HTML-Parser", "- ipset-libs", "- perl-Net-LibIDN", "- perl-Git", "- firewalld", "- plymouth", "- perl-CGI", "- python3-setuptools", "- perl-WWW-RobotRules", "- firewalld-filesystem", "- shim-x64", "- ruby-irb", "- perl-Pod-Simple", "- perl-Error", "- perl-HTML-Format", "- lsscsi", "- perl-HTTP-Daemon", "- alsa-lib", "- redhat-logos", "- rubygem-json", "- perl-Date-Manip", "- perl-Net-HTTP", "- perl-Digest", "- perl-IO-Socket-SSL", "- ebtables", "- plymouth-scripts", "- perl-IO-stringy", "- time", "- perl-podlators", "- perl-constant", "- perl-Pod-Escapes", "- perl-Net-SSLeay", "- perl-Business-ISBN", "- alsa-tools-firmware", "- perl-Filter", "- librepo", "- perl-Pod-Usage", "- python-slip", "- alsa-firmware", "- perl-IO-Socket-IP", "- python3-pip", "Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "Key: 8e89e20c645cea600b240156071d81c64daab7ad", "----------------------------------------", "Risk Factor: low ", "Title: Grep has incompatible changes in the next major version", "Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.", "The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.", "In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.", "When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.", "The 'grep -z' no longer automatically treats the byte '\\200' as binary data.", "Context no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.", "", "Remediation: [hint] Please update your scripts to be compatible with the changes.", "Key: 94665a499e2eeee35eca3e7093a7abe183384b16", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-beta-for-rhel-8-s390x-rpms", "- codeready-builder-beta-for-rhel-8-ppc64le-rpms", "- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-aarch64-eus-rpms", "- codeready-builder-for-rhel-8-ppc64le-eus-rpms", "- codeready-builder-beta-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-s390x-rpms", "- codeready-builder-for-rhel-8-s390x-eus-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rpms", "- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms", "- codeready-builder-beta-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms", "- codeready-builder-for-rhel-8-ppc64le-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", "Risk Factor: info ", "Title: SElinux relabeling will be scheduled", "Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.", "Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "----------------------------------------", "Risk Factor: info ", "Title: Current PAM and nsswitch.conf configuration will be kept.", "Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2025-11-13T21:38:30.162633Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': 'adae75813d0116f229a1cc59d60e13e441a0a1960789e5a06837ecd3147d2931', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "adae75813d0116f229a1cc59d60e13e441a0a1960789e5a06837ecd3147d2931", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:38:30.162633Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-11-13T21:38:32.353428Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': 'fbd75cd39ec4b6d8581653c4535afb6456df4ca4139f75cf40c6023cded93063', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "fbd75cd39ec4b6d8581653c4535afb6456df4ca4139f75cf40c6023cded93063", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:38:32.353428Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2025-11-13T21:38:32.528941Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': '4e73133133dbdf92337e388bd2ab98de1e60202e5377aeca4e088a15a22fcab8', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4e73133133dbdf92337e388bd2ab98de1e60202e5377aeca4e088a15a22fcab8", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:38:32.528941Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2025-11-13T21:38:33.255643Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': 'dc70e688688f8b068314f79febf7f1e271f128a72e98da923c5ace04af16d663', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "dc70e688688f8b068314f79febf7f1e271f128a72e98da923c5ace04af16d663", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:38:33.255643Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2025-11-13T21:38:33.258484Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': '7ff0f73291412075bcf21d685f81bf52653e7ce5da7619639d0bb18acdacca12', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "7ff0f73291412075bcf21d685f81bf52653e7ce5da7619639d0bb18acdacca12", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:38:33.258484Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2025-11-13T21:38:33.296578Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': 'b5261c8423e9577351fdcd1dbd6f6c4f1e7793ad694fcad59fe4be60db08c2e6', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "b5261c8423e9577351fdcd1dbd6f6c4f1e7793ad694fcad59fe4be60db08c2e6", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:38:33.296578Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2025-11-13T21:38:33.650644Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': 'b028b9dedfaf38b64c2d2c2b2cc3ffe3e0bf5a8febc6ccdfcb0c044f2363a949', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "b028b9dedfaf38b64c2d2c2b2cc3ffe3e0bf5a8febc6ccdfcb0c044f2363a949", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:38:33.650644Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2025-11-13T21:38:33.944151Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': '3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:38:33.944151Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:38:33.944151Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:38:35.401828Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '355bc4067f03556bad5eb70596899005d2edaa67080c432e95e580844df6c029', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "355bc4067f03556bad5eb70596899005d2edaa67080c432e95e580844df6c029", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:38:35.401828Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2025-11-13T21:38:35.847942Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': 'dac30f248198b8463c2f5c4eeb659d3d2c4bd234a358d43a13c1f1bdcc5f2bbb', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "dac30f248198b8463c2f5c4eeb659d3d2c4bd234a358d43a13c1f1bdcc5f2bbb", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:38:35.847942Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2025-11-13T21:38:35.996995Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': 'c439366ebcb1d31cd2a1489e5adad8cd6912c75a31b797a59420a8e8e8ac5b49', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "c439366ebcb1d31cd2a1489e5adad8cd6912c75a31b797a59420a8e8e8ac5b49", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:38:35.996995Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2025-11-13T21:38:36.104584Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-libs'}, {'scheme': 'package', 'title': 'perl-libs'}, {'scheme': 'package', 'title': 'perl-XML-Twig'}, {'scheme': 'package', 'title': 'perl-HTML-Tagset'}, {'scheme': 'package', 'title': 'perl-parent'}, {'scheme': 'package', 'title': 'efivar-libs'}, {'scheme': 'package', 'title': 'perl-Time-HiRes'}, {'scheme': 'package', 'title': 'perl-HTTP-Cookies'}, {'scheme': 'package', 'title': 'vim-common'}, {'scheme': 'package', 'title': 'perl-Pod-Perldoc'}, {'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'perl-macros'}, {'scheme': 'package', 'title': 'perl-IO-Compress'}, {'scheme': 'package', 'title': 'python-slip-dbus'}, {'scheme': 'package', 'title': 'perl-HTTP-Date'}, {'scheme': 'package', 'title': 'ruby-libs'}, {'scheme': 'package', 'title': 'perl-XML-NamespaceSupport'}, {'scheme': 'package', 'title': 'rubygems'}, {'scheme': 'package', 'title': 'grub2-efi-x64-modules'}, {'scheme': 'package', 'title': 'perl-HTTP-Message'}, {'scheme': 'package', 'title': 'ipset'}, {'scheme': 'package', 'title': 'perl-Socket'}, {'scheme': 'package', 'title': 'rubygem-psych'}, {'scheme': 'package', 'title': 'libdrm'}, {'scheme': 'package', 'title': 'perl-Time-Local'}, {'scheme': 'package', 'title': 'rubygem-bigdecimal'}, {'scheme': 'package', 'title': 'perl-File-Temp'}, {'scheme': 'package', 'title': 'python3'}, {'scheme': 'package', 'title': 'perl-Text-ParseWords'}, {'scheme': 'package', 'title': 'gpm-libs'}, {'scheme': 'package', 'title': 'perl-LWP-MediaTypes'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Zlib'}, {'scheme': 'package', 'title': 'perl-TermReadKey'}, {'scheme': 'package', 'title': 'perl-threads'}, {'scheme': 'package', 'title': 'perl-File-Listing'}, {'scheme': 'package', 'title': 'rubygem-rdoc'}, {'scheme': 'package', 'title': 'perl-Scalar-List-Utils'}, {'scheme': 'package', 'title': 'perl-HTTP-Tiny'}, {'scheme': 'package', 'title': 'perl-XML-SAX'}, {'scheme': 'package', 'title': 'perl-LWP-Protocol-https'}, {'scheme': 'package', 'title': 'vim-filesystem'}, {'scheme': 'package', 'title': 'perl-IO-Zlib'}, {'scheme': 'package', 'title': 'rng-tools'}, {'scheme': 'package', 'title': 'libpciaccess'}, {'scheme': 'package', 'title': 'perl-Mozilla-CA'}, {'scheme': 'package', 'title': 'python-firewall'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'perl-threads-shared'}, {'scheme': 'package', 'title': 'mailcap'}, {'scheme': 'package', 'title': 'perl-Business-ISBN-Data'}, {'scheme': 'package', 'title': 'perl-Encode'}, {'scheme': 'package', 'title': 'perl-Carp'}, {'scheme': 'package', 'title': 'linux-firmware'}, {'scheme': 'package', 'title': 'perl-HTTP-Negotiate'}, {'scheme': 'package', 'title': 'rubygem-io-console'}, {'scheme': 'package', 'title': 'perl-Data-Dumper'}, {'scheme': 'package', 'title': 'perl-Exporter'}, {'scheme': 'package', 'title': 'aic94xx-firmware'}, {'scheme': 'package', 'title': 'wget'}, {'scheme': 'package', 'title': 'vim-enhanced'}, {'scheme': 'package', 'title': 'perl-libwww-perl'}, {'scheme': 'package', 'title': 'perl-URI'}, {'scheme': 'package', 'title': 'perl-Module-Load'}, {'scheme': 'package', 'title': 'perl-XML-LibXML'}, {'scheme': 'package', 'title': 'perl-File-Path'}, {'scheme': 'package', 'title': 'perl-Encode-Locale'}, {'scheme': 'package', 'title': 'perl-XML-SAX-Base'}, {'scheme': 'package', 'title': 'perl-XML-Parser'}, {'scheme': 'package', 'title': 'iprutils'}, {'scheme': 'package', 'title': 'biosdevname'}, {'scheme': 'package', 'title': 'perl-FCGI'}, {'scheme': 'package', 'title': 'perl-TimeDate'}, {'scheme': 'package', 'title': 'mokutil'}, {'scheme': 'package', 'title': 'git'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Bzip2'}, {'scheme': 'package', 'title': 'perl'}, {'scheme': 'package', 'title': 'perl-Font-AFM'}, {'scheme': 'package', 'title': 'fxload'}, {'scheme': 'package', 'title': 'perl-Storable'}, {'scheme': 'package', 'title': 'perl-Digest-MD5'}, {'scheme': 'package', 'title': 'plymouth-core-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'perl-Getopt-Long'}, {'scheme': 'package', 'title': 'perl-HTML-Tree'}, {'scheme': 'package', 'title': 'perl-IO-HTML'}, {'scheme': 'package', 'title': 'ruby'}, {'scheme': 'package', 'title': 'perl-PathTools'}, {'scheme': 'package', 'title': 'perl-HTML-Parser'}, {'scheme': 'package', 'title': 'ipset-libs'}, {'scheme': 'package', 'title': 'perl-Net-LibIDN'}, {'scheme': 'package', 'title': 'perl-Git'}, {'scheme': 'package', 'title': 'firewalld'}, {'scheme': 'package', 'title': 'plymouth'}, {'scheme': 'package', 'title': 'perl-CGI'}, {'scheme': 'package', 'title': 'python3-setuptools'}, {'scheme': 'package', 'title': 'perl-WWW-RobotRules'}, {'scheme': 'package', 'title': 'firewalld-filesystem'}, {'scheme': 'package', 'title': 'shim-x64'}, {'scheme': 'package', 'title': 'ruby-irb'}, {'scheme': 'package', 'title': 'perl-Pod-Simple'}, {'scheme': 'package', 'title': 'perl-Error'}, {'scheme': 'package', 'title': 'perl-HTML-Format'}, {'scheme': 'package', 'title': 'lsscsi'}, {'scheme': 'package', 'title': 'perl-HTTP-Daemon'}, {'scheme': 'package', 'title': 'alsa-lib'}, {'scheme': 'package', 'title': 'redhat-logos'}, {'scheme': 'package', 'title': 'rubygem-json'}, {'scheme': 'package', 'title': 'perl-Date-Manip'}, {'scheme': 'package', 'title': 'perl-Net-HTTP'}, {'scheme': 'package', 'title': 'perl-Digest'}, {'scheme': 'package', 'title': 'perl-IO-Socket-SSL'}, {'scheme': 'package', 'title': 'ebtables'}, {'scheme': 'package', 'title': 'plymouth-scripts'}, {'scheme': 'package', 'title': 'perl-IO-stringy'}, {'scheme': 'package', 'title': 'time'}, {'scheme': 'package', 'title': 'perl-podlators'}, {'scheme': 'package', 'title': 'perl-constant'}, {'scheme': 'package', 'title': 'perl-Pod-Escapes'}, {'scheme': 'package', 'title': 'perl-Net-SSLeay'}, {'scheme': 'package', 'title': 'perl-Business-ISBN'}, {'scheme': 'package', 'title': 'alsa-tools-firmware'}, {'scheme': 'package', 'title': 'perl-Filter'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'perl-Pod-Usage'}, {'scheme': 'package', 'title': 'python-slip'}, {'scheme': 'package', 'title': 'alsa-firmware'}, {'scheme': 'package', 'title': 'perl-IO-Socket-IP'}, {'scheme': 'package', 'title': 'python3-pip'}, {'scheme': 'repository', 'title': 'rhel-Server'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': 'd66b19e3d900c6df6e90eef949c19fefec97796d88bda578a380e5b445b11a82', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "d66b19e3d900c6df6e90eef949c19fefec97796d88bda578a380e5b445b11a82", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:38:36.104584Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2025-11-13T21:38:36.177942Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': 'be213252addaffdf5ff2d280d71345f58bc81c3f61c911d3a68b908b0774d305', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "be213252addaffdf5ff2d280d71345f58bc81c3f61c911d3a68b908b0774d305", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:38:36.177942Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:38:36.720616Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': '6712ac5e9241f02d1d86a30fbbf460fc08a687260dd43d7101a57b5421386000', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "6712ac5e9241f02d1d86a30fbbf460fc08a687260dd43d7101a57b5421386000", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:38:36.720616Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['sanity'], 'title': 'Packages not signed by Red Hat found on the system', 'timeStamp': '2025-11-13T21:38:36.879667Z', 'hostname': 'managed-node01', 'actor': 'red_hat_signed_rpm_check', 'summary': 'The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel', 'audience': 'sysadmin', 'key': '13f0791ae5f19f50e7d0d606fb6501f91b1efb2c', 'id': '657489a37b48ea949f2f14f0c6589c80e95d4da7849c91f8d3ce257efdcec925', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "657489a37b48ea949f2f14f0c6589c80e95d4da7849c91f8d3ce257efdcec925", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:38:36.879667Z", "title": "Packages not signed by Red Hat found on the system"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004050", "end": "2025-11-13 16:39:00.087878", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:39:00.083828", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\nSummary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: f08a07da902958defa4f5c2699fae9ec2eb67c5b\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.003097", "end": "2025-11-13 16:39:00.355196", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:39:00.352099", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.analysis : Set stats for leapp_inhibitors] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:17 ok: [managed-node01] => {"ansible_stats": {"aggregate": true, "data": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:38:33.944151Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}]}, "per_host": false}, "changed": false} TASK [infra.leapp.analysis : Notify analysis report is done handler] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/tasks/main.yml:22 NOTIFIED HANDLER infra.leapp.analysis : Preupgrade analysis report is done for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display inhibitors for managed-node01 NOTIFIED HANDLER infra.leapp.analysis : Display errors for managed-node01 changed: [managed-node01] => {"changed": true, "msg": "All assertions passed"} TASK [common_upgrade_tasks | Flush handlers] *********************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:59 META: triggered running handlers for managed-node01 RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"atime": 1763069871.3188097, "attr_flags": "", "attributes": [], "block_size": 4096, "blocks": 40, "charset": "us-ascii", "checksum": "539bfdd2863e66cd260e0964b7e20a8db1203918", "ctime": 1763069917.3359802, "dev": 51713, "device_type": 0, "executable": false, "exists": true, "gid": 0, "gr_name": "root", "inode": 448790636, "isblk": false, "ischr": false, "isdir": false, "isfifo": false, "isgid": false, "islnk": false, "isreg": true, "issock": false, "isuid": false, "mimetype": "text/plain", "mode": "0644", "mtime": 1763069917.3359802, "nlink": 1, "path": "/var/log/ripu/ripu.log", "pw_name": "root", "readable": true, "rgrp": true, "roth": true, "rusr": true, "size": 17450, "uid": 0, "version": "1625172755", "wgrp": false, "woth": false, "writeable": true, "wusr": true, "xgrp": false, "xoth": false, "xusr": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 changed: [managed-node01] => {"backup": "", "changed": true, "msg": "line added"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 ok: [managed-node01] => {"changed": false, "content": "RIPU preupgrade analysis
Job started at 2025-11-13T21:37:50Z
==> Processing phase `configuration_phase`
====> * ipu_workflow_config
        IPU workflow config actor
==> Processing phase `FactsCollection`
====> * get_enabled_modules
        Provides data about which module streams are enabled on the source system.
====> * system_facts
        Provides data about many facts from system.
====> * sctp_read_status
        Determines whether or not the SCTP kernel module might be wanted.
====> * tcp_wrappers_config_read
        Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.
====> * scandasd
        In case of s390x architecture, check whether DASD is used.
====> * removed_pam_modules_scanner
        Scan PAM configuration for modules that are not available in RHEL-8.
====> * storage_scanner
        Provides data about storage settings.
====> * scanzfcp
        In case of s390x architecture, check whether ZFCP is used.
====> * scan_systemd_source
        Provides info about systemd on the source system
====> * repository_mapping
        Produces message containing repository mapping based on provided file.
====> * root_scanner
        Scan the system root directory and produce a message containing
====> * scan_kernel_cmdline
        No documentation has been provided for the scan_kernel_cmdline actor.
====> * common_leapp_dracut_modules
        Influences the generation of the initram disk
====> * sssd_facts
        Check SSSD configuration for changes in RHEL8 and report them in model.
====> * rpm_scanner
        Provides data about installed RPM Packages.
====> * trusted_gpg_keys_scanner
        Scan for trusted GPG keys.
====> * pam_modules_scanner
        Scan the pam directory for services and modules used in them
====> * scan_grub_config
        Scan grub configuration files for errors.
====> * firewalld_facts_actor
        Provide data about firewalld
====> * scan_custom_modifications_actor
        Collects information about files in leapp directories that have been modified or newly added.
====> * scan_files_for_target_userspace
        Scan the source system and identify files that will be copied into the target userspace when it is created.
====> * scan_custom_repofile
        Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.
====> * satellite_upgrade_facts
        Report which Satellite packages require updates and how to handle PostgreSQL data
====> * check_kde_apps
        Actor checks which KDE apps are installed.
====> * check_grub_legacy
        Check whether GRUB Legacy is installed in the MBR.
====> * load_device_driver_deprecation_data
        Loads deprecation data for drivers and devices (PCI & CPU)
====> * transaction_workarounds
        Provides additional RPM transaction tasks based on bundled RPM packages.
====> * selinuxcontentscanner
        Scan the system for any SELinux customizations
====> * scanclienablerepo
        Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.
====> * read_openssh_config
        Collect information about the OpenSSH configuration.
====> * scan_fips
        Determine whether the source system has FIPS enabled.
====> * detect_kernel_drivers
        Matches all currently loaded kernel drivers against known deprecated and removed drivers.
====> * copy_dnf_conf_into_target_userspace
        Copy dnf.conf into target userspace
====> * udevadm_info
        Produces data exported by the "udevadm info" command.
====> * register_yum_adjustment
        Registers a workaround which will adjust the yum directories during the upgrade.
====> * distribution_signed_rpm_scanner
        Provide data about distribution signed & unsigned RPM packages.
====> * scan_target_os_image
        Scans the provided target OS ISO image to use as a content source for the IPU, if any.
====> * scan_grub_device_name
        Find the name of the block devices where GRUB is located
====> * scanmemory
        Scan Memory of the machine.
====> * scan_subscription_manager_info
        Scans the current system for subscription manager information
====> * pci_devices_scanner
        Provides data about existing PCI Devices.
====> * source_boot_loader_scanner
        Scans the boot loader configuration on the source system.
====> * scan_pkg_manager
        Provides data about package manager (yum/dnf)
====> * checkrhui
        Check if system is using RHUI infrastructure (on public cloud) and send messages to
====> * scan_sap_hana
        Gathers information related to SAP HANA instances on the system.
====> * scan_source_files
        Scan files (explicitly specified) of the source system.
====> * scan_source_kernel
        Scan the source system kernel.
====> * network_manager_read_config
        Provides data about NetworkManager configuration.
====> * authselect_scanner
        Detect what authselect configuration should be suggested to administrator.
====> * remove_obsolete_gpg_keys
        Remove obsoleted RPM GPG keys.
====> * persistentnetnames
        Get network interface information for physical ethernet interfaces of the original system.
====> * xfs_info_scanner
        This actor scans all mounted mountpoints for XFS information
====> * get_installed_desktops
        Actor checks if kde or gnome desktop environments
====> * used_repository_scanner
        Scan used enabled repositories
====> * scancpu
        Scan CPUs of the machine.
====> * spamassassin_config_read
        Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the
====> * repositories_blacklist
        Exclude target repositories provided by Red Hat without support.
====> * scan_grub_device_partition_layout
        Scan all identified GRUB devices for their partition layout.
====> * vsftpd_config_read
        Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.
====> * rpm_transaction_config_tasks_collector
        Provides additional RPM transaction tasks from /etc/leapp/transaction.
====> * biosdevname
        Enable biosdevname on the target RHEL system if all interfaces on the source RHEL
====> * ipa_scanner
        Scan system for ipa-client and ipa-server status
====> * quagga_daemons
        Active quagga daemons check.
====> * multipath_conf_read
        Read multipath configuration files and extract the necessary information
====> * cups_scanner
        Gather facts about CUPS features which needs to be migrated
====> * scan_dynamic_linker_configuration
        Scan the dynamic linker configuration and find modifications.
====> * persistentnetnamesdisable
        Disable systemd-udevd persistent network naming on machine with single eth0 NIC
====> * pes_events_scanner
        Provides data about package events from Package Evolution Service.
====> * setuptargetrepos
        Produces list of repositories that should be available to be used by Upgrade process.
==> Processing phase `Checks`
====> * python_inform_user
        This actor informs the user of differences in Python version and support in RHEL 8.
====> * sctp_checks
        Parses collected SCTP information and take necessary actions.
====> * check_os_release
        Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.
====> * powertop
        Check if PowerTOP is installed. If yes, write information about non-compatible changes.
====> * check_openssl_conf
        Check whether the openssl configuration and openssl-IBMCA.
====> * checkmemory
        The actor check the size of RAM against RHEL8 minimal hardware requirements
====> * check_bind
        Actor parsing BIND configuration and checking for known issues in it.
====> * check_sap_hana
        If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.
====> * cephvolumescan
        Retrieves the list of encrypted Ceph OSD
====> * check_mount_options
        Check for mount options preventing the upgrade.
====> * check_root_symlinks
        Check if the symlinks /bin and /lib are relative, not absolute.
====> * checkirssi
        Check if irssi is installed. If yes, write information about non-compatible changes.
====> * multiple_package_versions
        Check for problematic 32bit packages installed together with 64bit ones.
====> * check_se_linux
        Check SELinux status and produce decision messages for further action.
====> * authselect_check
        Confirm suggested authselect call from AuthselectScanner.
====> * check_memcached
        Check for incompatible changes in memcached configuration.
====> * check_system_arch
        Check if system is running at a supported architecture. If no, inhibit the upgrade process.
====> * check_ha_cluster
        Check if HA Cluster is in use. If yes, inhibit the upgrade process.
====> * bacula_check
        Actor checking for presence of Bacula installation.
====> * unsupported_upgrade_check
        Checks environment variables and produces a warning report if the upgrade is unsupported.
====> * check_persistent_mounts
        Check if mounts required to be persistent are mounted in persistent fashion.
====> * check_grub_core
        Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core
====> * cups_check
        Reports changes in configuration between CUPS 1.6.3 and 2.2.6
====> * removed_pam_modules
        Check for modules that are not available in RHEL 8 anymore
====> * check_ntp
        Check if ntp and/or ntpdate configuration needs to be migrated.
====> * check_removed_envvars
        Check for usage of removed environment variables and inhibit the upgrade
====> * multipath_conf_check
        Checks whether the multipath configuration can be updated to RHEL-8 and
====> * check_first_partition_offset
        Check whether the first partition starts at the offset >=1MiB.
====> * check_detected_devices_and_drivers
        Checks whether or not detected devices and drivers are usable on the target system.
====> * checkacpid
        Check if acpid is installed. If yes, write information about non-compatible changes.
====> * check_nfs
        Check if NFS filesystem is in use. If yes, inhibit the upgrade process.
====> * quagga_report
        Checking for babeld on RHEL-7.
====> * open_ssh_use_privilege_separation
        UsePrivilegeSeparation configuration option was removed.
====> * checktargetrepos
        Check whether target yum repositories are specified.
====> * satellite_upgrade_check
        Check state of Satellite system before upgrade
====> * check_insights_auto_register
        Checks if system can be automatically registered into Red Hat Insights
====> * enable_device_cio_free_service
        Enables device_cio_free.service systemd service on s390x
====> * check_rhsmsku
        Ensure the system is subscribed to the subscription manager
====> * check_installed_kernels
        Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.
====> * check_etc_releasever
        Check releasever info and provide a guidance based on the facts
====> * check_btrfs
        Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.
====> * check_wireshark
        Report a couple of changes in tshark usage
====> * open_ssh_deprecated_directives_check
        Check for any deprecated directives in the OpenSSH configuration.
====> * check_fips
        Inhibit upgrade if FIPS is detected as enabled.
====> * check_custom_modifications_actor
        Checks CustomModifications messages and produces a report about files in leapp directories that have been
====> * checkdosfstools
        Check if dosfstools is installed. If yes, write information about non-compatible changes.
====> * postgresql_check
        Actor checking for presence of PostgreSQL installation.
====> * detect_grub_config_error
        Check grub configuration for various errors.
====> * check_sendmail
        Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers
====> * tcp_wrappers_check
        Check the list of packages previously compiled with TCP wrappers support
====> * openssh_permit_root_login
        OpenSSH no longer allows root logins with password.
====> * check_postfix
        Check if postfix is installed, check whether configuration update is needed.
====> * check_target_iso
        Check that the provided target ISO is a valid ISO image and is located on a persistent partition.
====> * check_fstab_mount_order
        Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.
====> * check_docker
        Checks if Docker is installed and warns about its deprecation in RHEL8.
====> * check_installed_devel_kernels
        Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.
====> * checkfstabxfsoptions
        Check the FSTAB file for the deprecated / removed XFS mount options.
====> * check_consumed_assets
        Check whether Leapp is using correct data assets.
====> * check_chrony
        Check for incompatible changes in chrony configuration.
====> * open_ssh_algorithms
        OpenSSH configuration does not contain any unsupported cryptographic algorithms.
====> * check_boot_avail_space
        Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.
====> * vsftpd_config_check
        Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that
====> * check_systemd_broken_symlinks
        Check whether some systemd symlinks are broken
====> * check_cifs
        Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.
====> * sssd_check
        Check SSSD configuration for changes in RHEL8 and report them.
====> * check_skipped_repositories
        Produces a report if any repositories enabled on the system are going to be skipped.
====> * check_kde_gnome
        Checks whether KDE is installed
====> * removed_pam_modules_check
        Check if it is all right to disable PAM modules that are not in RHEL-8.
====> * check_ipa_server
        Check for ipa-server and inhibit upgrade
====> * check_dynamic_linker_configuration
        Check for customization of dynamic linker configuration.
====> * check_brltty
        Check if brltty is installed, check whether configuration update is needed.
====> * check_firewalld
        Check for certain firewalld configuration that may prevent an upgrade.
====> * zipl_check_boot_entries
        Inhibits the upgrade if a problematic Zipl configuration is detected on the system.
====> * check_rpm_transaction_events
        Filter RPM transaction events based on installed RPM packages
====> * check_installed_debug_kernels
        Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.
====> * efi_check_boot
        Adjust EFI boot entry for first reboot
====> * open_ssh_protocol
        Protocol configuration option was removed.
====> * spamassassin_config_check
        Reports changes in spamassassin between RHEL-7 and RHEL-8
====> * checkgrep
        Check if Grep is installed. If yes, write information about non-compatible changes.
====> * check_yum_plugins_enabled
        Checks that the required yum plugins are enabled.
====> * red_hat_signed_rpm_check
        Check if there are packages not signed by Red Hat in use. If yes, warn user about it.
====> * checkhybridimage
        Check if the system is using Azure hybrid image.
====> * check_luks_and_inhibit
        Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.
====> * check_skip_phase
        Skip all the subsequent phases until the report phase.
==> Processing phase `Reports`
====> * verify_check_results
        Check all dialogs and notify that user needs to make some choices.
====> * verify_check_results
        Check all generated results messages and notify user about them.

Debug output written to /var/log/leapp/leapp-preupgrade.log

============================================================
                      REPORT OVERVIEW                       
============================================================

Upgrade has been inhibited due to the following problems:
    1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.

HIGH and MEDIUM severity reports:
    1. Packages available in excluded repositories will not be installed
    2. Difference in Python versions and support in RHEL 8
    3. GRUB2 core will be automatically updated during the upgrade
    4. Packages not signed by Red Hat found on the system
    5. chrony using default configuration
    6. Module pam_pkcs11 will be removed from PAM configuration

Reports summary:
    Errors:                      0
    Inhibitors:                  1
    HIGH severity reports:       4
    MEDIUM severity reports:     2
    LOW severity reports:        5
    INFO severity reports:       3

Before continuing, review the full report below for details about discovered problems and possible remediation instructions:
    A report has been generated at /var/log/leapp/leapp-report.txt
    A report has been generated at /var/log/leapp/leapp-report.json

============================================================
                   END OF REPORT OVERVIEW                   
============================================================

Answerfile has been generated at /var/log/leapp/answerfile
Job ended at 2025-11-13T21:39:00Z
", "encoding": "base64", "source": "/var/log/ripu/ripu.log"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 ok: [managed-node01] => {"ansible_facts": {"ripu_log_file": ["RIPU preupgrade analysis", "Job started at 2025-11-13T21:37:50Z", "==> Processing phase `configuration_phase`", "====> * ipu_workflow_config", " IPU workflow config actor", "==> Processing phase `FactsCollection`", "====> * get_enabled_modules", " Provides data about which module streams are enabled on the source system.", "====> * system_facts", " Provides data about many facts from system.", "====> * sctp_read_status", " Determines whether or not the SCTP kernel module might be wanted.", "====> * tcp_wrappers_config_read", " Parse tcp_wrappers configuration files /etc/hosts.{allow,deny}.", "====> * scandasd", " In case of s390x architecture, check whether DASD is used.", "====> * removed_pam_modules_scanner", " Scan PAM configuration for modules that are not available in RHEL-8.", "====> * storage_scanner", " Provides data about storage settings.", "====> * scanzfcp", " In case of s390x architecture, check whether ZFCP is used.", "====> * scan_systemd_source", " Provides info about systemd on the source system", "====> * repository_mapping", " Produces message containing repository mapping based on provided file.", "====> * root_scanner", " Scan the system root directory and produce a message containing", "====> * scan_kernel_cmdline", " No documentation has been provided for the scan_kernel_cmdline actor.", "====> * common_leapp_dracut_modules", " Influences the generation of the initram disk", "====> * sssd_facts", " Check SSSD configuration for changes in RHEL8 and report them in model.", "====> * rpm_scanner", " Provides data about installed RPM Packages.", "====> * trusted_gpg_keys_scanner", " Scan for trusted GPG keys.", "====> * pam_modules_scanner", " Scan the pam directory for services and modules used in them", "====> * scan_grub_config", " Scan grub configuration files for errors.", "====> * firewalld_facts_actor", " Provide data about firewalld", "====> * scan_custom_modifications_actor", " Collects information about files in leapp directories that have been modified or newly added.", "====> * scan_files_for_target_userspace", " Scan the source system and identify files that will be copied into the target userspace when it is created.", "====> * scan_custom_repofile", " Scan the custom /etc/leapp/files/leapp_upgrade_repositories.repo repo file.", "====> * satellite_upgrade_facts", " Report which Satellite packages require updates and how to handle PostgreSQL data", "====> * check_kde_apps", " Actor checks which KDE apps are installed.", "====> * check_grub_legacy", " Check whether GRUB Legacy is installed in the MBR.", "====> * load_device_driver_deprecation_data", " Loads deprecation data for drivers and devices (PCI & CPU)", "====> * transaction_workarounds", " Provides additional RPM transaction tasks based on bundled RPM packages.", "====> * selinuxcontentscanner", " Scan the system for any SELinux customizations", "====> * scanclienablerepo", " Produce CustomTargetRepository based on the LEAPP_ENABLE_REPOS in config.", "====> * read_openssh_config", " Collect information about the OpenSSH configuration.", "====> * scan_fips", " Determine whether the source system has FIPS enabled.", "====> * detect_kernel_drivers", " Matches all currently loaded kernel drivers against known deprecated and removed drivers.", "====> * copy_dnf_conf_into_target_userspace", " Copy dnf.conf into target userspace", "====> * udevadm_info", " Produces data exported by the \"udevadm info\" command.", "====> * register_yum_adjustment", " Registers a workaround which will adjust the yum directories during the upgrade.", "====> * distribution_signed_rpm_scanner", " Provide data about distribution signed & unsigned RPM packages.", "====> * scan_target_os_image", " Scans the provided target OS ISO image to use as a content source for the IPU, if any.", "====> * scan_grub_device_name", " Find the name of the block devices where GRUB is located", "====> * scanmemory", " Scan Memory of the machine.", "====> * scan_subscription_manager_info", " Scans the current system for subscription manager information", "====> * pci_devices_scanner", " Provides data about existing PCI Devices.", "====> * source_boot_loader_scanner", " Scans the boot loader configuration on the source system.", "====> * scan_pkg_manager", " Provides data about package manager (yum/dnf)", "====> * checkrhui", " Check if system is using RHUI infrastructure (on public cloud) and send messages to", "====> * scan_sap_hana", " Gathers information related to SAP HANA instances on the system.", "====> * scan_source_files", " Scan files (explicitly specified) of the source system.", "====> * scan_source_kernel", " Scan the source system kernel.", "====> * network_manager_read_config", " Provides data about NetworkManager configuration.", "====> * authselect_scanner", " Detect what authselect configuration should be suggested to administrator.", "====> * remove_obsolete_gpg_keys", " Remove obsoleted RPM GPG keys.", "====> * persistentnetnames", " Get network interface information for physical ethernet interfaces of the original system.", "====> * xfs_info_scanner", " This actor scans all mounted mountpoints for XFS information", "====> * get_installed_desktops", " Actor checks if kde or gnome desktop environments", "====> * used_repository_scanner", " Scan used enabled repositories", "====> * scancpu", " Scan CPUs of the machine.", "====> * spamassassin_config_read", " Reads spamc configuration (/etc/mail/spamassassin/spamc.conf), the", "====> * repositories_blacklist", " Exclude target repositories provided by Red Hat without support.", "====> * scan_grub_device_partition_layout", " Scan all identified GRUB devices for their partition layout.", "====> * vsftpd_config_read", " Reads vsftpd configuration files (/etc/vsftpd/*.conf) and extracts necessary information.", "====> * rpm_transaction_config_tasks_collector", " Provides additional RPM transaction tasks from /etc/leapp/transaction.", "====> * biosdevname", " Enable biosdevname on the target RHEL system if all interfaces on the source RHEL", "====> * ipa_scanner", " Scan system for ipa-client and ipa-server status", "====> * quagga_daemons", " Active quagga daemons check.", "====> * multipath_conf_read", " Read multipath configuration files and extract the necessary information", "====> * cups_scanner", " Gather facts about CUPS features which needs to be migrated", "====> * scan_dynamic_linker_configuration", " Scan the dynamic linker configuration and find modifications.", "====> * persistentnetnamesdisable", " Disable systemd-udevd persistent network naming on machine with single eth0 NIC", "====> * pes_events_scanner", " Provides data about package events from Package Evolution Service.", "====> * setuptargetrepos", " Produces list of repositories that should be available to be used by Upgrade process.", "==> Processing phase `Checks`", "====> * python_inform_user", " This actor informs the user of differences in Python version and support in RHEL 8.", "====> * sctp_checks", " Parses collected SCTP information and take necessary actions.", "====> * check_os_release", " Check if the current RHEL minor version is supported. If not, inhibit the upgrade process.", "====> * powertop", " Check if PowerTOP is installed. If yes, write information about non-compatible changes.", "====> * check_openssl_conf", " Check whether the openssl configuration and openssl-IBMCA.", "====> * checkmemory", " The actor check the size of RAM against RHEL8 minimal hardware requirements", "====> * check_bind", " Actor parsing BIND configuration and checking for known issues in it.", "====> * check_sap_hana", " If SAP HANA has been detected, several checks are performed to ensure a successful upgrade.", "====> * cephvolumescan", " Retrieves the list of encrypted Ceph OSD", "====> * check_mount_options", " Check for mount options preventing the upgrade.", "====> * check_root_symlinks", " Check if the symlinks /bin and /lib are relative, not absolute.", "====> * checkirssi", " Check if irssi is installed. If yes, write information about non-compatible changes.", "====> * multiple_package_versions", " Check for problematic 32bit packages installed together with 64bit ones.", "====> * check_se_linux", " Check SELinux status and produce decision messages for further action.", "====> * authselect_check", " Confirm suggested authselect call from AuthselectScanner.", "====> * check_memcached", " Check for incompatible changes in memcached configuration.", "====> * check_system_arch", " Check if system is running at a supported architecture. If no, inhibit the upgrade process.", "====> * check_ha_cluster", " Check if HA Cluster is in use. If yes, inhibit the upgrade process.", "====> * bacula_check", " Actor checking for presence of Bacula installation.", "====> * unsupported_upgrade_check", " Checks environment variables and produces a warning report if the upgrade is unsupported.", "====> * check_persistent_mounts", " Check if mounts required to be persistent are mounted in persistent fashion.", "====> * check_grub_core", " Check whether we are on legacy (BIOS) system and instruct Leapp to upgrade GRUB core", "====> * cups_check", " Reports changes in configuration between CUPS 1.6.3 and 2.2.6", "====> * removed_pam_modules", " Check for modules that are not available in RHEL 8 anymore", "====> * check_ntp", " Check if ntp and/or ntpdate configuration needs to be migrated.", "====> * check_removed_envvars", " Check for usage of removed environment variables and inhibit the upgrade", "====> * multipath_conf_check", " Checks whether the multipath configuration can be updated to RHEL-8 and", "====> * check_first_partition_offset", " Check whether the first partition starts at the offset >=1MiB.", "====> * check_detected_devices_and_drivers", " Checks whether or not detected devices and drivers are usable on the target system.", "====> * checkacpid", " Check if acpid is installed. If yes, write information about non-compatible changes.", "====> * check_nfs", " Check if NFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * quagga_report", " Checking for babeld on RHEL-7.", "====> * open_ssh_use_privilege_separation", " UsePrivilegeSeparation configuration option was removed.", "====> * checktargetrepos", " Check whether target yum repositories are specified.", "====> * satellite_upgrade_check", " Check state of Satellite system before upgrade", "====> * check_insights_auto_register", " Checks if system can be automatically registered into Red Hat Insights", "====> * enable_device_cio_free_service", " Enables device_cio_free.service systemd service on s390x", "====> * check_rhsmsku", " Ensure the system is subscribed to the subscription manager", "====> * check_installed_kernels", " Inhibit IPU (in-place upgrade) when installed kernels conflict with a safe upgrade.", "====> * check_etc_releasever", " Check releasever info and provide a guidance based on the facts", "====> * check_btrfs", " Check if Btrfs filesystem is in use. If yes, inhibit the upgrade process.", "====> * check_wireshark", " Report a couple of changes in tshark usage", "====> * open_ssh_deprecated_directives_check", " Check for any deprecated directives in the OpenSSH configuration.", "====> * check_fips", " Inhibit upgrade if FIPS is detected as enabled.", "====> * check_custom_modifications_actor", " Checks CustomModifications messages and produces a report about files in leapp directories that have been", "====> * checkdosfstools", " Check if dosfstools is installed. If yes, write information about non-compatible changes.", "====> * postgresql_check", " Actor checking for presence of PostgreSQL installation.", "====> * detect_grub_config_error", " Check grub configuration for various errors.", "====> * check_sendmail", " Check if sendmail is installed, check whether configuration update is needed, inhibit upgrade if TCP wrappers", "====> * tcp_wrappers_check", " Check the list of packages previously compiled with TCP wrappers support", "====> * openssh_permit_root_login", " OpenSSH no longer allows root logins with password.", "====> * check_postfix", " Check if postfix is installed, check whether configuration update is needed.", "====> * check_target_iso", " Check that the provided target ISO is a valid ISO image and is located on a persistent partition.", "====> * check_fstab_mount_order", " Checks order of entries in /etc/fstab based on their mount point and inhibits upgrade if overshadowing is detected.", "====> * check_docker", " Checks if Docker is installed and warns about its deprecation in RHEL8.", "====> * check_installed_devel_kernels", " Inhibit IPU (in-place upgrade) when multiple devel kernels are installed.", "====> * checkfstabxfsoptions", " Check the FSTAB file for the deprecated / removed XFS mount options.", "====> * check_consumed_assets", " Check whether Leapp is using correct data assets.", "====> * check_chrony", " Check for incompatible changes in chrony configuration.", "====> * open_ssh_algorithms", " OpenSSH configuration does not contain any unsupported cryptographic algorithms.", "====> * check_boot_avail_space", " Check if at least 100Mib of available space on /boot. If not, inhibit the upgrade process.", "====> * vsftpd_config_check", " Checks whether the vsftpd configuration is supported in RHEL-8. Namely checks that", "====> * check_systemd_broken_symlinks", " Check whether some systemd symlinks are broken", "====> * check_cifs", " Check if CIFS filesystem is in use. If yes, inhibit the upgrade process.", "====> * sssd_check", " Check SSSD configuration for changes in RHEL8 and report them.", "====> * check_skipped_repositories", " Produces a report if any repositories enabled on the system are going to be skipped.", "====> * check_kde_gnome", " Checks whether KDE is installed", "====> * removed_pam_modules_check", " Check if it is all right to disable PAM modules that are not in RHEL-8.", "====> * check_ipa_server", " Check for ipa-server and inhibit upgrade", "====> * check_dynamic_linker_configuration", " Check for customization of dynamic linker configuration.", "====> * check_brltty", " Check if brltty is installed, check whether configuration update is needed.", "====> * check_firewalld", " Check for certain firewalld configuration that may prevent an upgrade.", "====> * zipl_check_boot_entries", " Inhibits the upgrade if a problematic Zipl configuration is detected on the system.", "====> * check_rpm_transaction_events", " Filter RPM transaction events based on installed RPM packages", "====> * check_installed_debug_kernels", " Inhibit IPU (in-place upgrade) when multiple debug kernels are installed.", "====> * efi_check_boot", " Adjust EFI boot entry for first reboot", "====> * open_ssh_protocol", " Protocol configuration option was removed.", "====> * spamassassin_config_check", " Reports changes in spamassassin between RHEL-7 and RHEL-8", "====> * checkgrep", " Check if Grep is installed. If yes, write information about non-compatible changes.", "====> * check_yum_plugins_enabled", " Checks that the required yum plugins are enabled.", "====> * red_hat_signed_rpm_check", " Check if there are packages not signed by Red Hat in use. If yes, warn user about it.", "====> * checkhybridimage", " Check if the system is using Azure hybrid image.", "====> * check_luks_and_inhibit", " Check if any encrypted partitions is in use. If yes, inhibit the upgrade process.", "====> * check_skip_phase", " Skip all the subsequent phases until the report phase.", "==> Processing phase `Reports`", "====> * verify_check_results", " Check all dialogs and notify that user needs to make some choices.", "====> * verify_check_results", " Check all generated results messages and notify user about them.", "", "Debug output written to /var/log/leapp/leapp-preupgrade.log", "", "============================================================", " REPORT OVERVIEW ", "============================================================", "", "Upgrade has been inhibited due to the following problems:", " 1. Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "", "HIGH and MEDIUM severity reports:", " 1. Packages available in excluded repositories will not be installed", " 2. Difference in Python versions and support in RHEL 8", " 3. GRUB2 core will be automatically updated during the upgrade", " 4. Packages not signed by Red Hat found on the system", " 5. chrony using default configuration", " 6. Module pam_pkcs11 will be removed from PAM configuration", "", "Reports summary:", " Errors: 0", " Inhibitors: 1", " HIGH severity reports: 4", " MEDIUM severity reports: 2", " LOW severity reports: 5", " INFO severity reports: 3", "", "Before continuing, review the full report below for details about discovered problems and possible remediation instructions:", " A report has been generated at /var/log/leapp/leapp-report.txt", " A report has been generated at /var/log/leapp/leapp-report.json", "", "============================================================", " END OF REPORT OVERVIEW ", "============================================================", "", "Answerfile has been generated at /var/log/leapp/answerfile", "Job ended at 2025-11-13T21:39:00Z", ""]}, "changed": false} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 changed: [managed-node01] => {"changed": true, "cmd": "export PATH=$PATH\nmv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251113T163455\n", "delta": "0:00:00.004388", "end": "2025-11-13 16:39:01.545203", "msg": "", "rc": 0, "start": "2025-11-13 16:39:01.540815", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} RUNNING HANDLER [infra.leapp.analysis : Display inhibitors] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:32 ok: [managed-node01] => { "results_inhibitors.stdout_lines": [ "Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------" ] } RUNNING HANDLER [infra.leapp.analysis : Display errors] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:40 skipping: [managed-node01] => {} RUNNING HANDLER [infra.leapp.analysis : Preupgrade analysis report is done] **** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/analysis/handlers/main.yml:48 ok: [managed-node01] => { "msg": "The preupgrade analysis report generation is now complete. WARNING: Inhibitors found. Review the tasks above or the result file at /var/log/leapp/leapp-report.txt." } RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Check for log file] ********************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:3 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} RUNNING HANDLER [infra.leapp.common : Add end time to log file] **************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Slurp ripu.log file] ********************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:19 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Decode ripu.log file] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:26 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} RUNNING HANDLER [infra.leapp.common : Rename log file] ************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/handlers/main.yml:32 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [common_upgrade_tasks | Run upgrade role] ********************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tasks/common_upgrade_tasks.yml:62 TASK [infra.leapp.common : Log directory exists] ******************************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:3 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/var/log/ripu", "secontext": "unconfined_u:object_r:var_log_t:s0", "size": 38, "state": "directory", "uid": 0} TASK [infra.leapp.common : Check for existing log file] ************************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:11 ok: [managed-node01] => {"changed": false, "stat": {"exists": false}} TASK [infra.leapp.common : Fail if log file already exists] ******************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:16 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : Create new log file] ******************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:21 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Check for log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Add end time to log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Slurp ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Decode ripu.log file for managed-node01 NOTIFIED HANDLER infra.leapp.common : Rename log file for managed-node01 changed: [managed-node01] => {"changed": true, "checksum": "68abde56ab0ff1823327ce375bd2dbf055d38843", "dest": "/var/log/ripu/ripu.log", "gid": 0, "group": "root", "md5sum": "171f9914ce1212c9659f91abff429e2c", "mode": "0644", "owner": "root", "secontext": "system_u:object_r:var_log_t:s0", "size": 61, "src": "/root/.ansible/tmp/ansible-tmp-1763069943.6957443-8156-16497996390576/source", "state": "file", "uid": 0} TASK [infra.leapp.common : /etc/ansible/facts.d directory exists] ************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:33 ok: [managed-node01] => {"changed": false, "gid": 0, "group": "root", "mode": "0755", "owner": "root", "path": "/etc/ansible/facts.d", "secontext": "unconfined_u:object_r:etc_t:s0", "size": 57, "state": "directory", "uid": 0} TASK [infra.leapp.common : Capture current ansible_facts for validation after upgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:41 ok: [managed-node01] => {"changed": false, "checksum": "40eb5afb1d7d22515dc739978336696eddc582de", "dest": "/etc/ansible/facts.d/pre_ripu.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/pre_ripu.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 12002, "state": "file", "uid": 0} TASK [infra.leapp.common : Capture a list of non-rhel versioned packages] ****** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:49 ok: [managed-node01] => {"changed": false, "cmd": "set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort", "delta": "0:00:00.382046", "end": "2025-11-13 16:39:05.479244", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:39:05.097198", "stderr": "", "stderr_lines": [], "stdout": "epel-release-7-14.noarch\ntps-devel-2.44.50-1.noarch", "stdout_lines": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]} TASK [infra.leapp.common : Create fact with the non-rhel versioned packages list] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:63 ok: [managed-node01] => {"ansible_facts": {"non_rhel_packages": ["epel-release-7-14.noarch", "tps-devel-2.44.50-1.noarch"]}, "changed": false} TASK [infra.leapp.common : Capture the list of non-rhel versioned packages in a separate fact file] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/main.yml:67 ok: [managed-node01] => {"changed": false, "checksum": "6d36b22d9c2b2f366fc090edfbac427c77d524a5", "dest": "/etc/ansible/facts.d/non_rhel_packages.fact", "gid": 0, "group": "root", "mode": "0644", "owner": "root", "path": "/etc/ansible/facts.d/non_rhel_packages.fact", "secontext": "system_u:object_r:etc_t:s0", "size": 58, "state": "file", "uid": 0} TASK [infra.leapp.upgrade : Include tasks for upgrade using redhat-upgrade-tool] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/main.yml:9 skipping: [managed-node01] => {"changed": false, "skip_reason": "Conditional result was False"} TASK [infra.leapp.upgrade : Include tasks for leapp upgrade] ******************* task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/main.yml:13 included: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml for managed-node01 TASK [leapp-upgrade | Run parse_leapp_report to check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:2 TASK [infra.leapp.common : parse_leapp_report | Default upgrade_inhibited to false] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:12 ok: [managed-node01] => {"ansible_facts": {"upgrade_inhibited": false}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Collect human readable report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:16 ok: [managed-node01] => {"changed": false, "content": "Risk Factor: high (inhibitor)
Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.
Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:
     - pata_acpi

Related links:
    - Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." : https://access.redhat.com/solutions/6971716
    - Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.": https://access.redhat.com/solutions/5436131
Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b
----------------------------------------
Risk Factor: high 
Title: Packages available in excluded repositories will not be installed
Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.
The list of these packages:
- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)
Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e
----------------------------------------
Risk Factor: high 
Title: Difference in Python versions and support in RHEL 8
Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python
Related links:
    - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python
Remediation: [hint] Please run "alternatives --set python /usr/bin/python3" after upgrade
Key: 0c98585b1d8d252eb540bf61560094f3495351f5
----------------------------------------
Risk Factor: high 
Title: GRUB2 core will be automatically updated during the upgrade
Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.
Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3
----------------------------------------
Risk Factor: high 
Title: Packages not signed by Red Hat found on the system
Summary: The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:
- beakerlib
- beakerlib-redhat
- epel-release
- restraint
- restraint-rhts
- tps-devel
Key: 13f0791ae5f19f50e7d0d606fb6501f91b1efb2c
----------------------------------------
Risk Factor: medium 
Title: chrony using default configuration
Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives
Key: c4222ebd18730a76f6bc7b3b66df898b106e6554
----------------------------------------
Risk Factor: medium 
Title: Module pam_pkcs11 will be removed from PAM configuration
Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.
Remediation: [hint] Configure SSSD to replace pam_pkcs11
Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3
----------------------------------------
Risk Factor: low 
Title: SElinux will be set to permissive mode
Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.
Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.
Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f
----------------------------------------
Risk Factor: low 
Title: Postfix has incompatible changes in the next major version
Summary: Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.
The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.
It can be turned on by running:  "postconf -e compatibility_level=0
It can be turned off by running: "postconf -e compatibility_level=2

In the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.

The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.

Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.

The "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.

The "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.

The "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.

The "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.

Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.

Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33
----------------------------------------
Risk Factor: low 
Title: Detected broken systemd symlinks for non-existing services
Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:
    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Remediation: [hint] Remove the invalid symlinks before the upgrade.
[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service
Key: be2083fee03f5f0a708fd193d82d2fe20aee7217
----------------------------------------
Risk Factor: low 
Title: Some enabled RPM repositories are unknown to Leapp
Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:
- rhel-Server
And the following packages installed from those repositories may not be upgraded:
- python3-libs
- perl-libs
- perl-XML-Twig
- perl-HTML-Tagset
- perl-parent
- efivar-libs
- perl-Time-HiRes
- perl-HTTP-Cookies
- vim-common
- perl-Pod-Perldoc
- libsolv
- perl-macros
- perl-IO-Compress
- python-slip-dbus
- perl-HTTP-Date
- ruby-libs
- perl-XML-NamespaceSupport
- rubygems
- grub2-efi-x64-modules
- perl-HTTP-Message
- ipset
- perl-Socket
- rubygem-psych
- libdrm
- perl-Time-Local
- rubygem-bigdecimal
- perl-File-Temp
- python3
- perl-Text-ParseWords
- gpm-libs
- perl-LWP-MediaTypes
- perl-Compress-Raw-Zlib
- perl-TermReadKey
- perl-threads
- perl-File-Listing
- rubygem-rdoc
- perl-Scalar-List-Utils
- perl-HTTP-Tiny
- perl-XML-SAX
- perl-LWP-Protocol-https
- vim-filesystem
- perl-IO-Zlib
- rng-tools
- libpciaccess
- perl-Mozilla-CA
- python-firewall
- json-glib
- perl-threads-shared
- mailcap
- perl-Business-ISBN-Data
- perl-Encode
- perl-Carp
- linux-firmware
- perl-HTTP-Negotiate
- rubygem-io-console
- perl-Data-Dumper
- perl-Exporter
- aic94xx-firmware
- wget
- vim-enhanced
- perl-libwww-perl
- perl-URI
- perl-Module-Load
- perl-XML-LibXML
- perl-File-Path
- perl-Encode-Locale
- perl-XML-SAX-Base
- perl-XML-Parser
- iprutils
- biosdevname
- perl-FCGI
- perl-TimeDate
- mokutil
- git
- perl-Compress-Raw-Bzip2
- perl
- perl-Font-AFM
- fxload
- perl-Storable
- perl-Digest-MD5
- plymouth-core-libs
- libreport-filesystem
- perl-Getopt-Long
- perl-HTML-Tree
- perl-IO-HTML
- ruby
- perl-PathTools
- perl-HTML-Parser
- ipset-libs
- perl-Net-LibIDN
- perl-Git
- firewalld
- plymouth
- perl-CGI
- python3-setuptools
- perl-WWW-RobotRules
- firewalld-filesystem
- shim-x64
- ruby-irb
- perl-Pod-Simple
- perl-Error
- perl-HTML-Format
- lsscsi
- perl-HTTP-Daemon
- alsa-lib
- redhat-logos
- rubygem-json
- perl-Date-Manip
- perl-Net-HTTP
- perl-Digest
- perl-IO-Socket-SSL
- ebtables
- plymouth-scripts
- perl-IO-stringy
- time
- perl-podlators
- perl-constant
- perl-Pod-Escapes
- perl-Net-SSLeay
- perl-Business-ISBN
- alsa-tools-firmware
- perl-Filter
- librepo
- perl-Pod-Usage
- python-slip
- alsa-firmware
- perl-IO-Socket-IP
- python3-pip
Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket
Key: 8e89e20c645cea600b240156071d81c64daab7ad
----------------------------------------
Risk Factor: low 
Title: Grep has incompatible changes in the next major version
Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.
The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.
In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.
When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.
The 'grep -z' no longer automatically treats the byte '\200' as binary data.
Context no longer excludes selected lines omitted because of -m. For example, 'grep "^" -m1 -A1' now outputs the first two input lines, not just the first line.

Remediation: [hint] Please update your scripts to be compatible with the changes.
Key: 94665a499e2eeee35eca3e7093a7abe183384b16
----------------------------------------
Risk Factor: info 
Title: Excluded target system repositories
Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.
- codeready-builder-beta-for-rhel-8-s390x-rpms
- codeready-builder-beta-for-rhel-8-ppc64le-rpms
- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-aarch64-eus-rpms
- codeready-builder-for-rhel-8-ppc64le-eus-rpms
- codeready-builder-beta-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-s390x-rpms
- codeready-builder-for-rhel-8-s390x-eus-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rpms
- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms
- codeready-builder-beta-for-rhel-8-aarch64-rpms
- codeready-builder-for-rhel-8-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rhui-rpms
- codeready-builder-for-rhel-8-x86_64-rpms
- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms
- codeready-builder-for-rhel-8-ppc64le-rpms
Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).
Key: 1b9132cb2362ae7830e48eee7811be9527747de8
----------------------------------------
Risk Factor: info 
Title: SElinux relabeling will be scheduled
Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.
Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72
----------------------------------------
Risk Factor: info 
Title: Current PAM and nsswitch.conf configuration will be kept.
Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.
Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c
----------------------------------------
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.txt"} TASK [infra.leapp.common : parse_leapp_report | Collect JSON report results] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:21 ok: [managed-node01] => {"changed": false, "content": "{
  "leapp_run_id": "4725b966-12bc-41f4-a62b-959635eb509d", 
  "entries": [
    {
      "groups": [
        "repository", 
        "failure"
      ], 
      "title": "Excluded target system repositories", 
      "timeStamp": "2025-11-13T21:38:30.162633Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times)."
          }
        ]
      }, 
      "actor": "repositories_blacklist", 
      "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", 
      "audience": "sysadmin", 
      "key": "1b9132cb2362ae7830e48eee7811be9527747de8", 
      "id": "adae75813d0116f229a1cc59d60e13e441a0a1960789e5a06837ecd3147d2931", 
      "severity": "info"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Packages available in excluded repositories will not be installed", 
      "timeStamp": "2025-11-13T21:38:32.353428Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-pyxattr"
          }, 
          {
            "scheme": "package", 
            "title": "rpcgen"
          }
        ]
      }, 
      "actor": "pes_events_scanner", 
      "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", 
      "audience": "sysadmin", 
      "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", 
      "id": "fbd75cd39ec4b6d8581653c4535afb6456df4ca4139f75cf40c6023cded93063", 
      "severity": "high"
    }, 
    {
      "groups": [
        "python"
      ], 
      "title": "Difference in Python versions and support in RHEL 8", 
      "timeStamp": "2025-11-13T21:38:32.528941Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python"
          }, 
          {
            "scheme": "package", 
            "title": "python2"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }
        ], 
        "external": [
          {
            "url": "https://red.ht/rhel-8-python", 
            "title": "Difference in Python versions and support in RHEL 8"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade"
          }
        ]
      }, 
      "actor": "python_inform_user", 
      "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 
      "audience": "developer", 
      "key": "0c98585b1d8d252eb540bf61560094f3495351f5", 
      "id": "4e73133133dbdf92337e388bd2ab98de1e60202e5377aeca4e088a15a22fcab8", 
      "severity": "high"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux relabeling will be scheduled", 
      "timeStamp": "2025-11-13T21:38:33.255643Z", 
      "hostname": "managed-node01", 
      "actor": "check_se_linux", 
      "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", 
      "audience": "sysadmin", 
      "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", 
      "id": "dc70e688688f8b068314f79febf7f1e271f128a72e98da923c5ace04af16d663", 
      "severity": "info"
    }, 
    {
      "groups": [
        "selinux", 
        "security"
      ], 
      "title": "SElinux will be set to permissive mode", 
      "timeStamp": "2025-11-13T21:38:33.258484Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings."
          }
        ]
      }, 
      "actor": "check_se_linux", 
      "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", 
      "audience": "sysadmin", 
      "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", 
      "id": "7ff0f73291412075bcf21d685f81bf52653e7ce5da7619639d0bb18acdacca12", 
      "severity": "low"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Current PAM and nsswitch.conf configuration will be kept.", 
      "timeStamp": "2025-11-13T21:38:33.296578Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "authselect"
          }, 
          {
            "scheme": "package", 
            "title": "authconfig"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/nsswitch.conf"
          }
        ]
      }, 
      "actor": "authselect_check", 
      "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", 
      "audience": "sysadmin", 
      "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", 
      "id": "b5261c8423e9577351fdcd1dbd6f6c4f1e7793ad694fcad59fe4be60db08c2e6", 
      "severity": "info"
    }, 
    {
      "groups": [
        "boot"
      ], 
      "title": "GRUB2 core will be automatically updated during the upgrade", 
      "timeStamp": "2025-11-13T21:38:33.650644Z", 
      "hostname": "managed-node01", 
      "actor": "check_grub_core", 
      "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", 
      "audience": "sysadmin", 
      "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", 
      "id": "b028b9dedfaf38b64c2d2c2b2cc3ffe3e0bf5a8febc6ccdfcb0c044f2363a949", 
      "severity": "high"
    }, 
    {
      "groups": [
        "kernel", 
        "drivers", 
        "inhibitor"
      ], 
      "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", 
      "timeStamp": "2025-11-13T21:38:33.944151Z", 
      "hostname": "managed-node01", 
      "detail": {
        "external": [
          {
            "url": "https://access.redhat.com/solutions/6971716", 
            "title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" "
          }, 
          {
            "url": "https://access.redhat.com/solutions/5436131", 
            "title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\""
          }
        ]
      }, 
      "actor": "check_detected_devices_and_drivers", 
      "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n     - pata_acpi\n", 
      "audience": "sysadmin", 
      "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", 
      "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", 
      "severity": "high"
    }, 
    {
      "groups": [
        "services", 
        "email"
      ], 
      "title": "Postfix has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:38:35.401828Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "postfix"
          }
        ]
      }, 
      "actor": "check_postfix", 
      "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running:  \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", 
      "audience": "sysadmin", 
      "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", 
      "id": "355bc4067f03556bad5eb70596899005d2edaa67080c432e95e580844df6c029", 
      "severity": "low"
    }, 
    {
      "groups": [
        "services", 
        "time management"
      ], 
      "title": "chrony using default configuration", 
      "timeStamp": "2025-11-13T21:38:35.847942Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "ntpd"
          }, 
          {
            "scheme": "package", 
            "title": "chrony"
          }, 
          {
            "scheme": "file", 
            "title": "/etc/chrony.conf"
          }
        ]
      }, 
      "actor": "check_chrony", 
      "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", 
      "audience": "sysadmin", 
      "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", 
      "id": "dac30f248198b8463c2f5c4eeb659d3d2c4bd234a358d43a13c1f1bdcc5f2bbb", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "filesystem"
      ], 
      "title": "Detected broken systemd symlinks for non-existing services", 
      "timeStamp": "2025-11-13T21:38:35.996995Z", 
      "hostname": "managed-node01", 
      "detail": {
        "remediations": [
          {
            "type": "hint", 
            "context": "Remove the invalid symlinks before the upgrade."
          }, 
          {
            "type": "command", 
            "context": [
              "/usr/bin/rm", 
              "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"
            ]
          }
        ]
      }, 
      "actor": "check_systemd_broken_symlinks", 
      "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n    - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", 
      "audience": "sysadmin", 
      "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", 
      "id": "c439366ebcb1d31cd2a1489e5adad8cd6912c75a31b797a59420a8e8e8ac5b49", 
      "severity": "low"
    }, 
    {
      "groups": [
        "repository"
      ], 
      "title": "Some enabled RPM repositories are unknown to Leapp", 
      "timeStamp": "2025-11-13T21:38:36.104584Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "python3-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Twig"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tagset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-parent"
          }, 
          {
            "scheme": "package", 
            "title": "efivar-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-HiRes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Cookies"
          }, 
          {
            "scheme": "package", 
            "title": "vim-common"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Perldoc"
          }, 
          {
            "scheme": "package", 
            "title": "libsolv"
          }, 
          {
            "scheme": "package", 
            "title": "perl-macros"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Compress"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip-dbus"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Date"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-NamespaceSupport"
          }, 
          {
            "scheme": "package", 
            "title": "rubygems"
          }, 
          {
            "scheme": "package", 
            "title": "grub2-efi-x64-modules"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Message"
          }, 
          {
            "scheme": "package", 
            "title": "ipset"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Socket"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-psych"
          }, 
          {
            "scheme": "package", 
            "title": "libdrm"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Time-Local"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-bigdecimal"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Temp"
          }, 
          {
            "scheme": "package", 
            "title": "python3"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Text-ParseWords"
          }, 
          {
            "scheme": "package", 
            "title": "gpm-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-MediaTypes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TermReadKey"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Listing"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-rdoc"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Scalar-List-Utils"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Tiny"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX"
          }, 
          {
            "scheme": "package", 
            "title": "perl-LWP-Protocol-https"
          }, 
          {
            "scheme": "package", 
            "title": "vim-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Zlib"
          }, 
          {
            "scheme": "package", 
            "title": "rng-tools"
          }, 
          {
            "scheme": "package", 
            "title": "libpciaccess"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Mozilla-CA"
          }, 
          {
            "scheme": "package", 
            "title": "python-firewall"
          }, 
          {
            "scheme": "package", 
            "title": "json-glib"
          }, 
          {
            "scheme": "package", 
            "title": "perl-threads-shared"
          }, 
          {
            "scheme": "package", 
            "title": "mailcap"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN-Data"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Carp"
          }, 
          {
            "scheme": "package", 
            "title": "linux-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Negotiate"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-io-console"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Data-Dumper"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Exporter"
          }, 
          {
            "scheme": "package", 
            "title": "aic94xx-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "wget"
          }, 
          {
            "scheme": "package", 
            "title": "vim-enhanced"
          }, 
          {
            "scheme": "package", 
            "title": "perl-libwww-perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-URI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Module-Load"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-LibXML"
          }, 
          {
            "scheme": "package", 
            "title": "perl-File-Path"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Encode-Locale"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-SAX-Base"
          }, 
          {
            "scheme": "package", 
            "title": "perl-XML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "iprutils"
          }, 
          {
            "scheme": "package", 
            "title": "biosdevname"
          }, 
          {
            "scheme": "package", 
            "title": "perl-FCGI"
          }, 
          {
            "scheme": "package", 
            "title": "perl-TimeDate"
          }, 
          {
            "scheme": "package", 
            "title": "mokutil"
          }, 
          {
            "scheme": "package", 
            "title": "git"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Compress-Raw-Bzip2"
          }, 
          {
            "scheme": "package", 
            "title": "perl"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Font-AFM"
          }, 
          {
            "scheme": "package", 
            "title": "fxload"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Storable"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest-MD5"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-core-libs"
          }, 
          {
            "scheme": "package", 
            "title": "libreport-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Getopt-Long"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Tree"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-HTML"
          }, 
          {
            "scheme": "package", 
            "title": "ruby"
          }, 
          {
            "scheme": "package", 
            "title": "perl-PathTools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Parser"
          }, 
          {
            "scheme": "package", 
            "title": "ipset-libs"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-LibIDN"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Git"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth"
          }, 
          {
            "scheme": "package", 
            "title": "perl-CGI"
          }, 
          {
            "scheme": "package", 
            "title": "python3-setuptools"
          }, 
          {
            "scheme": "package", 
            "title": "perl-WWW-RobotRules"
          }, 
          {
            "scheme": "package", 
            "title": "firewalld-filesystem"
          }, 
          {
            "scheme": "package", 
            "title": "shim-x64"
          }, 
          {
            "scheme": "package", 
            "title": "ruby-irb"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Simple"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Error"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTML-Format"
          }, 
          {
            "scheme": "package", 
            "title": "lsscsi"
          }, 
          {
            "scheme": "package", 
            "title": "perl-HTTP-Daemon"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-lib"
          }, 
          {
            "scheme": "package", 
            "title": "redhat-logos"
          }, 
          {
            "scheme": "package", 
            "title": "rubygem-json"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Date-Manip"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-HTTP"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Digest"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-SSL"
          }, 
          {
            "scheme": "package", 
            "title": "ebtables"
          }, 
          {
            "scheme": "package", 
            "title": "plymouth-scripts"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-stringy"
          }, 
          {
            "scheme": "package", 
            "title": "time"
          }, 
          {
            "scheme": "package", 
            "title": "perl-podlators"
          }, 
          {
            "scheme": "package", 
            "title": "perl-constant"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Escapes"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Net-SSLeay"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Business-ISBN"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-tools-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Filter"
          }, 
          {
            "scheme": "package", 
            "title": "librepo"
          }, 
          {
            "scheme": "package", 
            "title": "perl-Pod-Usage"
          }, 
          {
            "scheme": "package", 
            "title": "python-slip"
          }, 
          {
            "scheme": "package", 
            "title": "alsa-firmware"
          }, 
          {
            "scheme": "package", 
            "title": "perl-IO-Socket-IP"
          }, 
          {
            "scheme": "package", 
            "title": "python3-pip"
          }, 
          {
            "scheme": "repository", 
            "title": "rhel-Server"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket"
          }
        ]
      }, 
      "actor": "check_skipped_repositories", 
      "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", 
      "audience": "sysadmin", 
      "key": "8e89e20c645cea600b240156071d81c64daab7ad", 
      "id": "d66b19e3d900c6df6e90eef949c19fefec97796d88bda578a380e5b445b11a82", 
      "severity": "low"
    }, 
    {
      "groups": [
        "authentication", 
        "security", 
        "tools"
      ], 
      "title": "Module pam_pkcs11 will be removed from PAM configuration", 
      "timeStamp": "2025-11-13T21:38:36.177942Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "sssd"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Configure SSSD to replace pam_pkcs11"
          }
        ]
      }, 
      "actor": "removed_pam_modules_check", 
      "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", 
      "audience": "sysadmin", 
      "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", 
      "id": "be213252addaffdf5ff2d280d71345f58bc81c3f61c911d3a68b908b0774d305", 
      "severity": "medium"
    }, 
    {
      "groups": [
        "tools"
      ], 
      "title": "Grep has incompatible changes in the next major version", 
      "timeStamp": "2025-11-13T21:38:36.720616Z", 
      "hostname": "managed-node01", 
      "detail": {
        "related_resources": [
          {
            "scheme": "package", 
            "title": "grep"
          }
        ], 
        "remediations": [
          {
            "type": "hint", 
            "context": "Please update your scripts to be compatible with the changes."
          }
        ]
      }, 
      "actor": "checkgrep", 
      "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", 
      "audience": "sysadmin", 
      "key": "94665a499e2eeee35eca3e7093a7abe183384b16", 
      "id": "6712ac5e9241f02d1d86a30fbbf460fc08a687260dd43d7101a57b5421386000", 
      "severity": "low"
    }, 
    {
      "groups": [
        "sanity"
      ], 
      "title": "Packages not signed by Red Hat found on the system", 
      "timeStamp": "2025-11-13T21:38:36.879667Z", 
      "hostname": "managed-node01", 
      "actor": "red_hat_signed_rpm_check", 
      "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", 
      "audience": "sysadmin", 
      "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", 
      "id": "657489a37b48ea949f2f14f0c6589c80e95d4da7849c91f8d3ce257efdcec925", 
      "severity": "high"
    }
  ]
}
", "encoding": "base64", "source": "/var/log/leapp/leapp-report.json"} TASK [infra.leapp.common : parse_leapp_report | Parse report results] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:26 ok: [managed-node01] => {"ansible_facts": {"leapp_report_json": {"entries": [{"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "adae75813d0116f229a1cc59d60e13e441a0a1960789e5a06837ecd3147d2931", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:38:30.162633Z", "title": "Excluded target system repositories"}, {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "fbd75cd39ec4b6d8581653c4535afb6456df4ca4139f75cf40c6023cded93063", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:38:32.353428Z", "title": "Packages available in excluded repositories will not be installed"}, {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4e73133133dbdf92337e388bd2ab98de1e60202e5377aeca4e088a15a22fcab8", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:38:32.528941Z", "title": "Difference in Python versions and support in RHEL 8"}, {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "dc70e688688f8b068314f79febf7f1e271f128a72e98da923c5ace04af16d663", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:38:33.255643Z", "title": "SElinux relabeling will be scheduled"}, {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "7ff0f73291412075bcf21d685f81bf52653e7ce5da7619639d0bb18acdacca12", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:38:33.258484Z", "title": "SElinux will be set to permissive mode"}, {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "b5261c8423e9577351fdcd1dbd6f6c4f1e7793ad694fcad59fe4be60db08c2e6", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:38:33.296578Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "b028b9dedfaf38b64c2d2c2b2cc3ffe3e0bf5a8febc6ccdfcb0c044f2363a949", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:38:33.650644Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:38:33.944151Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "355bc4067f03556bad5eb70596899005d2edaa67080c432e95e580844df6c029", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:38:35.401828Z", "title": "Postfix has incompatible changes in the next major version"}, {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "dac30f248198b8463c2f5c4eeb659d3d2c4bd234a358d43a13c1f1bdcc5f2bbb", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:38:35.847942Z", "title": "chrony using default configuration"}, {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "c439366ebcb1d31cd2a1489e5adad8cd6912c75a31b797a59420a8e8e8ac5b49", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:38:35.996995Z", "title": "Detected broken systemd symlinks for non-existing services"}, {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "d66b19e3d900c6df6e90eef949c19fefec97796d88bda578a380e5b445b11a82", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:38:36.104584Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "be213252addaffdf5ff2d280d71345f58bc81c3f61c911d3a68b908b0774d305", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:38:36.177942Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "6712ac5e9241f02d1d86a30fbbf460fc08a687260dd43d7101a57b5421386000", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:38:36.720616Z", "title": "Grep has incompatible changes in the next major version"}, {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "657489a37b48ea949f2f14f0c6589c80e95d4da7849c91f8d3ce257efdcec925", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:38:36.879667Z", "title": "Packages not signed by Red Hat found on the system"}], "leapp_run_id": "4725b966-12bc-41f4-a62b-959635eb509d"}, "leapp_report_txt": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------", "Risk Factor: high ", "Title: Packages available in excluded repositories will not be installed", "Summary: 2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.", "The list of these packages:", "- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "Key: 2437e204808f987477c0e9be8e4c95b3a87a9f3e", "----------------------------------------", "Risk Factor: high ", "Title: Difference in Python versions and support in RHEL 8", "Summary: In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "Related links:", " - Difference in Python versions and support in RHEL 8: https://red.ht/rhel-8-python", "Remediation: [hint] Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "Key: 0c98585b1d8d252eb540bf61560094f3495351f5", "----------------------------------------", "Risk Factor: high ", "Title: GRUB2 core will be automatically updated during the upgrade", "Summary: On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "Key: ac7030e05d2ee248d34f08a9fa040b352bc410a3", "----------------------------------------", "Risk Factor: high ", "Title: Packages not signed by Red Hat found on the system", "Summary: The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:", "- beakerlib", "- beakerlib-redhat", "- epel-release", "- restraint", "- restraint-rhts", "- tps-devel", "Key: 13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "----------------------------------------", "Risk Factor: medium ", "Title: chrony using default configuration", "Summary: default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "Key: c4222ebd18730a76f6bc7b3b66df898b106e6554", "----------------------------------------", "Risk Factor: medium ", "Title: Module pam_pkcs11 will be removed from PAM configuration", "Summary: Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "Remediation: [hint] Configure SSSD to replace pam_pkcs11", "Key: bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "----------------------------------------", "Risk Factor: low ", "Title: SElinux will be set to permissive mode", "Summary: SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "Remediation: [hint] Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "Key: 39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "----------------------------------------", "Risk Factor: low ", "Title: Postfix has incompatible changes in the next major version", "Summary: Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.", "The backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.", "It can be turned on by running: \"postconf -e compatibility_level=0", "It can be turned off by running: \"postconf -e compatibility_level=2", "", "In the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.", "", "The postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.", "", "Postfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.", "", "The \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.", "", "The \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.", "", "The \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.", "", "The \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.", "", "Postfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.", "", "Key: 5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "----------------------------------------", "Risk Factor: low ", "Title: Detected broken systemd symlinks for non-existing services", "Summary: Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:", " - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Remediation: [hint] Remove the invalid symlinks before the upgrade.", "[command] /usr/bin/rm /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "Key: be2083fee03f5f0a708fd193d82d2fe20aee7217", "----------------------------------------", "Risk Factor: low ", "Title: Some enabled RPM repositories are unknown to Leapp", "Summary: The following repositories with Red Hat-signed packages are unknown to Leapp:", "- rhel-Server", "And the following packages installed from those repositories may not be upgraded:", "- python3-libs", "- perl-libs", "- perl-XML-Twig", "- perl-HTML-Tagset", "- perl-parent", "- efivar-libs", "- perl-Time-HiRes", "- perl-HTTP-Cookies", "- vim-common", "- perl-Pod-Perldoc", "- libsolv", "- perl-macros", "- perl-IO-Compress", "- python-slip-dbus", "- perl-HTTP-Date", "- ruby-libs", "- perl-XML-NamespaceSupport", "- rubygems", "- grub2-efi-x64-modules", "- perl-HTTP-Message", "- ipset", "- perl-Socket", "- rubygem-psych", "- libdrm", "- perl-Time-Local", "- rubygem-bigdecimal", "- perl-File-Temp", "- python3", "- perl-Text-ParseWords", "- gpm-libs", "- perl-LWP-MediaTypes", "- perl-Compress-Raw-Zlib", "- perl-TermReadKey", "- perl-threads", "- perl-File-Listing", "- rubygem-rdoc", "- perl-Scalar-List-Utils", "- perl-HTTP-Tiny", "- perl-XML-SAX", "- perl-LWP-Protocol-https", "- vim-filesystem", "- perl-IO-Zlib", "- rng-tools", "- libpciaccess", "- perl-Mozilla-CA", "- python-firewall", "- json-glib", "- perl-threads-shared", "- mailcap", "- perl-Business-ISBN-Data", "- perl-Encode", "- perl-Carp", "- linux-firmware", "- perl-HTTP-Negotiate", "- rubygem-io-console", "- perl-Data-Dumper", "- perl-Exporter", "- aic94xx-firmware", "- wget", "- vim-enhanced", "- perl-libwww-perl", "- perl-URI", "- perl-Module-Load", "- perl-XML-LibXML", "- perl-File-Path", "- perl-Encode-Locale", "- perl-XML-SAX-Base", "- perl-XML-Parser", "- iprutils", "- biosdevname", "- perl-FCGI", "- perl-TimeDate", "- mokutil", "- git", "- perl-Compress-Raw-Bzip2", "- perl", "- perl-Font-AFM", "- fxload", "- perl-Storable", "- perl-Digest-MD5", "- plymouth-core-libs", "- libreport-filesystem", "- perl-Getopt-Long", "- perl-HTML-Tree", "- perl-IO-HTML", "- ruby", "- perl-PathTools", "- perl-HTML-Parser", "- ipset-libs", "- perl-Net-LibIDN", "- perl-Git", "- firewalld", "- plymouth", "- perl-CGI", "- python3-setuptools", "- perl-WWW-RobotRules", "- firewalld-filesystem", "- shim-x64", "- ruby-irb", "- perl-Pod-Simple", "- perl-Error", "- perl-HTML-Format", "- lsscsi", "- perl-HTTP-Daemon", "- alsa-lib", "- redhat-logos", "- rubygem-json", "- perl-Date-Manip", "- perl-Net-HTTP", "- perl-Digest", "- perl-IO-Socket-SSL", "- ebtables", "- plymouth-scripts", "- perl-IO-stringy", "- time", "- perl-podlators", "- perl-constant", "- perl-Pod-Escapes", "- perl-Net-SSLeay", "- perl-Business-ISBN", "- alsa-tools-firmware", "- perl-Filter", "- librepo", "- perl-Pod-Usage", "- python-slip", "- alsa-firmware", "- perl-IO-Socket-IP", "- python3-pip", "Remediation: [hint] You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "Key: 8e89e20c645cea600b240156071d81c64daab7ad", "----------------------------------------", "Risk Factor: low ", "Title: Grep has incompatible changes in the next major version", "Summary: If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.", "The 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.", "In locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.", "When searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.", "The 'grep -z' no longer automatically treats the byte '\\200' as binary data.", "Context no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.", "", "Remediation: [hint] Please update your scripts to be compatible with the changes.", "Key: 94665a499e2eeee35eca3e7093a7abe183384b16", "----------------------------------------", "Risk Factor: info ", "Title: Excluded target system repositories", "Summary: The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.", "- codeready-builder-beta-for-rhel-8-s390x-rpms", "- codeready-builder-beta-for-rhel-8-ppc64le-rpms", "- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-aarch64-eus-rpms", "- codeready-builder-for-rhel-8-ppc64le-eus-rpms", "- codeready-builder-beta-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-s390x-rpms", "- codeready-builder-for-rhel-8-s390x-eus-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rpms", "- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms", "- codeready-builder-beta-for-rhel-8-aarch64-rpms", "- codeready-builder-for-rhel-8-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rhui-rpms", "- codeready-builder-for-rhel-8-x86_64-rpms", "- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms", "- codeready-builder-for-rhel-8-ppc64le-rpms", "Remediation: [hint] If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "Key: 1b9132cb2362ae7830e48eee7811be9527747de8", "----------------------------------------", "Risk Factor: info ", "Title: SElinux relabeling will be scheduled", "Summary: SElinux relabeling will be scheduled as the status is permissive/enforcing.", "Key: 8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "----------------------------------------", "Risk Factor: info ", "Title: Current PAM and nsswitch.conf configuration will be kept.", "Summary: There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "Key: 40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "----------------------------------------", ""]}, "changed": false} TASK [infra.leapp.common : parse_leapp_report | Check for inhibitors] ********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:32 skipping: [managed-node01] => (item={'groups': ['repository', 'failure'], 'title': 'Excluded target system repositories', 'timeStamp': '2025-11-13T21:38:30.162633Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).'}]}, 'actor': 'repositories_blacklist', 'summary': 'The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms', 'audience': 'sysadmin', 'key': '1b9132cb2362ae7830e48eee7811be9527747de8', 'id': 'adae75813d0116f229a1cc59d60e13e441a0a1960789e5a06837ecd3147d2931', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "repositories_blacklist", "audience": "sysadmin", "detail": {"remediations": [{"context": "If some of excluded repositories are still required to be used during the upgrade, execute leapp with the --enablerepo option with the repoid of the repository required to be enabled as an argument (the option can be used multiple times).", "type": "hint"}]}, "groups": ["repository", "failure"], "hostname": "managed-node01", "id": "adae75813d0116f229a1cc59d60e13e441a0a1960789e5a06837ecd3147d2931", "key": "1b9132cb2362ae7830e48eee7811be9527747de8", "severity": "info", "summary": "The following repositories are not supported by Red Hat and are excluded from the list of repositories used during the upgrade.\n- codeready-builder-beta-for-rhel-8-s390x-rpms\n- codeready-builder-beta-for-rhel-8-ppc64le-rpms\n- rhui-codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-aarch64-eus-rpms\n- codeready-builder-for-rhel-8-ppc64le-eus-rpms\n- codeready-builder-beta-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-s390x-rpms\n- codeready-builder-for-rhel-8-s390x-eus-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rpms\n- rhui-codeready-builder-for-rhel-8-aarch64-rhui-rpms\n- codeready-builder-beta-for-rhel-8-aarch64-rpms\n- codeready-builder-for-rhel-8-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rhui-rpms\n- codeready-builder-for-rhel-8-x86_64-rpms\n- codeready-builder-for-rhel-8-x86_64-eus-rhui-rpms\n- codeready-builder-for-rhel-8-ppc64le-rpms", "timeStamp": "2025-11-13T21:38:30.162633Z", "title": "Excluded target system repositories"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Packages available in excluded repositories will not be installed', 'timeStamp': '2025-11-13T21:38:32.353428Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-pyxattr'}, {'scheme': 'package', 'title': 'rpcgen'}]}, 'actor': 'pes_events_scanner', 'summary': '2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled "Excluded target system repositories" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)', 'audience': 'sysadmin', 'key': '2437e204808f987477c0e9be8e4c95b3a87a9f3e', 'id': 'fbd75cd39ec4b6d8581653c4535afb6456df4ca4139f75cf40c6023cded93063', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "pes_events_scanner", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-pyxattr"}, {"scheme": "package", "title": "rpcgen"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "fbd75cd39ec4b6d8581653c4535afb6456df4ca4139f75cf40c6023cded93063", "key": "2437e204808f987477c0e9be8e4c95b3a87a9f3e", "severity": "high", "summary": "2 packages will be skipped because they are available only in target system repositories that are intentionally excluded from the list of repositories used during the upgrade. See the report message titled \"Excluded target system repositories\" for details.\nThe list of these packages:\n- python3-pyxattr (repoid: codeready-builder-for-rhel-8-x86_64-rpms)\n- rpcgen (repoid: codeready-builder-for-rhel-8-x86_64-rpms)", "timeStamp": "2025-11-13T21:38:32.353428Z", "title": "Packages available in excluded repositories will not be installed"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['python'], 'title': 'Difference in Python versions and support in RHEL 8', 'timeStamp': '2025-11-13T21:38:32.528941Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python'}, {'scheme': 'package', 'title': 'python2'}, {'scheme': 'package', 'title': 'python3'}], 'external': [{'url': 'https://red.ht/rhel-8-python', 'title': 'Difference in Python versions and support in RHEL 8'}], 'remediations': [{'type': 'hint', 'context': 'Please run "alternatives --set python /usr/bin/python3" after upgrade'}]}, 'actor': 'python_inform_user', 'summary': "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", 'audience': 'developer', 'key': '0c98585b1d8d252eb540bf61560094f3495351f5', 'id': '4e73133133dbdf92337e388bd2ab98de1e60202e5377aeca4e088a15a22fcab8', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "python_inform_user", "audience": "developer", "detail": {"external": [{"title": "Difference in Python versions and support in RHEL 8", "url": "https://red.ht/rhel-8-python"}], "related_resources": [{"scheme": "package", "title": "python"}, {"scheme": "package", "title": "python2"}, {"scheme": "package", "title": "python3"}], "remediations": [{"context": "Please run \"alternatives --set python /usr/bin/python3\" after upgrade", "type": "hint"}]}, "groups": ["python"], "hostname": "managed-node01", "id": "4e73133133dbdf92337e388bd2ab98de1e60202e5377aeca4e088a15a22fcab8", "key": "0c98585b1d8d252eb540bf61560094f3495351f5", "severity": "high", "summary": "In RHEL 8, there is no 'python' command. Python 3 (backward incompatible) is the primary Python version and Python 2 is available with limited support and limited set of packages. If you no longer require Python 2 packages following the upgrade, please remove them. Read more here: https://red.ht/rhel-8-python", "timeStamp": "2025-11-13T21:38:32.528941Z", "title": "Difference in Python versions and support in RHEL 8"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux relabeling will be scheduled', 'timeStamp': '2025-11-13T21:38:33.255643Z', 'hostname': 'managed-node01', 'actor': 'check_se_linux', 'summary': 'SElinux relabeling will be scheduled as the status is permissive/enforcing.', 'audience': 'sysadmin', 'key': '8fb81863f8413bd617c2a55b69b8e10ff03d7c72', 'id': 'dc70e688688f8b068314f79febf7f1e271f128a72e98da923c5ace04af16d663', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "dc70e688688f8b068314f79febf7f1e271f128a72e98da923c5ace04af16d663", "key": "8fb81863f8413bd617c2a55b69b8e10ff03d7c72", "severity": "info", "summary": "SElinux relabeling will be scheduled as the status is permissive/enforcing.", "timeStamp": "2025-11-13T21:38:33.255643Z", "title": "SElinux relabeling will be scheduled"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['selinux', 'security'], 'title': 'SElinux will be set to permissive mode', 'timeStamp': '2025-11-13T21:38:33.258484Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the "/root/tmp_leapp_py3" SElinux warnings.'}]}, 'actor': 'check_se_linux', 'summary': 'SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.', 'audience': 'sysadmin', 'key': '39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f', 'id': '7ff0f73291412075bcf21d685f81bf52653e7ce5da7619639d0bb18acdacca12', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_se_linux", "audience": "sysadmin", "detail": {"remediations": [{"context": "Make sure there are no SElinux related warnings after the upgrade and enable SElinux manually afterwards. Notice: You can ignore the \"/root/tmp_leapp_py3\" SElinux warnings.", "type": "hint"}]}, "groups": ["selinux", "security"], "hostname": "managed-node01", "id": "7ff0f73291412075bcf21d685f81bf52653e7ce5da7619639d0bb18acdacca12", "key": "39d7183dafba798aa4bbb1e70b0ef2bbe5b1772f", "severity": "low", "summary": "SElinux will be set to permissive mode. Current mode: enforcing. This action is required by the upgrade process to make sure the upgraded system can boot without beinig blocked by SElinux rules.", "timeStamp": "2025-11-13T21:38:33.258484Z", "title": "SElinux will be set to permissive mode"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Current PAM and nsswitch.conf configuration will be kept.', 'timeStamp': '2025-11-13T21:38:33.296578Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'authselect'}, {'scheme': 'package', 'title': 'authconfig'}, {'scheme': 'file', 'title': '/etc/nsswitch.conf'}]}, 'actor': 'authselect_check', 'summary': 'There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.', 'audience': 'sysadmin', 'key': '40c4ab1da4a30dc1ca40e543f6385e1336d8810c', 'id': 'b5261c8423e9577351fdcd1dbd6f6c4f1e7793ad694fcad59fe4be60db08c2e6', 'severity': 'info'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "authselect_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "authselect"}, {"scheme": "package", "title": "authconfig"}, {"scheme": "file", "title": "/etc/nsswitch.conf"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "b5261c8423e9577351fdcd1dbd6f6c4f1e7793ad694fcad59fe4be60db08c2e6", "key": "40c4ab1da4a30dc1ca40e543f6385e1336d8810c", "severity": "info", "summary": "There is a new tool called authselect in RHEL8 that replaced authconfig. The upgrade process was unable to find an authselect profile that would be equivalent to your current configuration. Therefore your configuration will be left intact.", "timeStamp": "2025-11-13T21:38:33.296578Z", "title": "Current PAM and nsswitch.conf configuration will be kept."}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['boot'], 'title': 'GRUB2 core will be automatically updated during the upgrade', 'timeStamp': '2025-11-13T21:38:33.650644Z', 'hostname': 'managed-node01', 'actor': 'check_grub_core', 'summary': 'On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running "grub2-install" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.', 'audience': 'sysadmin', 'key': 'ac7030e05d2ee248d34f08a9fa040b352bc410a3', 'id': 'b028b9dedfaf38b64c2d2c2b2cc3ffe3e0bf5a8febc6ccdfcb0c044f2363a949', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_grub_core", "audience": "sysadmin", "groups": ["boot"], "hostname": "managed-node01", "id": "b028b9dedfaf38b64c2d2c2b2cc3ffe3e0bf5a8febc6ccdfcb0c044f2363a949", "key": "ac7030e05d2ee248d34f08a9fa040b352bc410a3", "severity": "high", "summary": "On legacy (BIOS) systems, GRUB2 core (located in the gap between the MBR and the first partition) cannot be updated during the rpm transaction and Leapp has to initiate the update running \"grub2-install\" after the transaction. No action is needed before the upgrade. After the upgrade, it is recommended to check the GRUB configuration.", "timeStamp": "2025-11-13T21:38:33.650644Z", "title": "GRUB2 core will be automatically updated during the upgrade"}, "skip_reason": "Conditional result was False"} ok: [managed-node01] => (item={'groups': ['kernel', 'drivers', 'inhibitor'], 'title': 'Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.', 'timeStamp': '2025-11-13T21:38:33.944151Z', 'hostname': 'managed-node01', 'detail': {'external': [{'url': 'https://access.redhat.com/solutions/6971716', 'title': 'Leapp preupgrade getting "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed." '}, {'url': 'https://access.redhat.com/solutions/5436131', 'title': 'Leapp upgrade fail with error "Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."'}]}, 'actor': 'check_detected_devices_and_drivers', 'summary': 'Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n', 'audience': 'sysadmin', 'key': 'f08a07da902958defa4f5c2699fae9ec2eb67c5b', 'id': '3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f', 'severity': 'high'}) => {"ansible_facts": {"leapp_inhibitors": [{"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "7767a016dc87e354a2cd9717eb97e73928308706d209cfc4811a4e7f7b84d82a", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:36:12.403805Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_nfs", "audience": "sysadmin", "detail": {"external": [{"title": "Why does leapp upgrade fail on detecting NFS during upgrade?", "url": "https://access.redhat.com/solutions/6964006"}], "related_resources": [{"scheme": "file", "title": "/etc/fstab"}], "remediations": [{"context": "Disable NFS temporarily for the upgrade if possible.", "type": "hint"}]}, "groups": ["filesystem", "network", "inhibitor"], "hostname": "managed-node01", "id": "9a901e0dd3f89512be82c067cd8570832d653f776b9ad6d171ea567520bcc2b4", "key": "9881b25faceeeaa7a6478bcdac29afd7f6baaaed", "severity": "high", "summary": "NFS is currently not supported by the inplace upgrade.\nWe have found NFS usage at the following locations:\n- NFS shares found in /etc/fstab:\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat /mnt/redhat\n - nest.test.redhat.com:/mnt/qa /mnt/qa\n - vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive /mnt/engarchive\n - nest.test.redhat.com:/mnt/tpsdist /mnt/tpsdist\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot /mnt/brew\n - ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch /mnt/brew_scratch\n", "timeStamp": "2025-11-13T21:36:12.870521Z", "title": "Use of NFS detected. Upgrade can't proceed"}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:38:33.944151Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}, {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:38:33.944151Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}], "upgrade_inhibited": true}, "ansible_loop_var": "item", "changed": false, "item": {"actor": "check_detected_devices_and_drivers", "audience": "sysadmin", "detail": {"external": [{"title": "Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" ", "url": "https://access.redhat.com/solutions/6971716"}, {"title": "Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\"", "url": "https://access.redhat.com/solutions/5436131"}]}, "groups": ["kernel", "drivers", "inhibitor"], "hostname": "managed-node01", "id": "3b200c6378a7bbeccce21cb8666b601ae4c4bbdf82319b93263c134d5b9bdc8f", "key": "f08a07da902958defa4f5c2699fae9ec2eb67c5b", "severity": "high", "summary": "Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n", "timeStamp": "2025-11-13T21:38:33.944151Z", "title": "Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed."}} skipping: [managed-node01] => (item={'groups': ['services', 'email'], 'title': 'Postfix has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:38:35.401828Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'postfix'}]}, 'actor': 'check_postfix', 'summary': 'Postfix 3.x has so called "compatibility safety net" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: "postconf -e compatibility_level=0\nIt can be turned off by running: "postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default "option_group" value has changed to "client", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set "option_group" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to "auto", and introduces a new parameter "tls_eecdh_auto_curves" with the names of curves that may be negotiated.\n\nThe "master.cf" chroot default value has changed from "y" (yes) to "n" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe "append_dot_mydomain" default value has changed from "yes" to "no". You may need changing it to "yes" if senders cannot use complete domain names in e-mail addresses.\n\nThe "relay_domains" default value has changed from "$mydestination" to the empty value. This could result in unexpected "Relay access denied" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe "mynetworks_style" default value has changed from "subnet" to "host". This parameter is used to implement the "permit_mynetworks" feature. The change could result in unexpected "access denied" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n', 'audience': 'sysadmin', 'key': '5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33', 'id': '355bc4067f03556bad5eb70596899005d2edaa67080c432e95e580844df6c029', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_postfix", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "postfix"}]}, "groups": ["services", "email"], "hostname": "managed-node01", "id": "355bc4067f03556bad5eb70596899005d2edaa67080c432e95e580844df6c029", "key": "5721e0a07a67d82cf7e5ea6f17662cd4f82e0a33", "severity": "low", "summary": "Postfix 3.x has so called \"compatibility safety net\" that runs Postfix programs with backwards-compatible default settings. It will log a warning whenever backwards-compatible default setting may be required for continuity of service. Based on this logging the system administrator can decide if any backwards-compatible settings need to be made permanent in main.cf or master.cf, before turning off the backwards-compatibility safety net.\nThe backward compatibility safety net is by default turned off in Red Hat Enterprise Linux 8.\nIt can be turned on by running: \"postconf -e compatibility_level=0\nIt can be turned off by running: \"postconf -e compatibility_level=2\n\nIn the Postfix MySQL database client, the default \"option_group\" value has changed to \"client\", i.e. it now reads options from the [client] group from the MySQL configuration file. To disable it, set \"option_group\" to the empty string.\n\nThe postqueue command no longer forces all message arrival times to be reported in UTC. To get the old behavior, set TZ=UTC in main.cf:import_environment.\n\nPostfix 3.2 enables elliptic curve negotiation. This changes the default smtpd_tls_eecdh_grade setting to \"auto\", and introduces a new parameter \"tls_eecdh_auto_curves\" with the names of curves that may be negotiated.\n\nThe \"master.cf\" chroot default value has changed from \"y\" (yes) to \"n\" (no). This applies to master.cf services where chroot field is not explicitly specified.\n\nThe \"append_dot_mydomain\" default value has changed from \"yes\" to \"no\". You may need changing it to \"yes\" if senders cannot use complete domain names in e-mail addresses.\n\nThe \"relay_domains\" default value has changed from \"$mydestination\" to the empty value. This could result in unexpected \"Relay access denied\" errors or ETRN errors, because now will postfix by default relay only for the localhost.\n\nThe \"mynetworks_style\" default value has changed from \"subnet\" to \"host\". This parameter is used to implement the \"permit_mynetworks\" feature. The change could result in unexpected \"access denied\" errors, because postfix will now by default trust only the local machine, not the remote SMTP clients on the same IP subnetwork.\n\nPostfix now supports dynamically loaded database plugins. Plugins are shipped in individual RPM sub-packages. Correct database plugins have to be installed, otherwise the specific database client will not work. For example for PostgreSQL map to work, the postfix-pgsql RPM package has to be installed.\n", "timeStamp": "2025-11-13T21:38:35.401828Z", "title": "Postfix has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['services', 'time management'], 'title': 'chrony using default configuration', 'timeStamp': '2025-11-13T21:38:35.847942Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'ntpd'}, {'scheme': 'package', 'title': 'chrony'}, {'scheme': 'file', 'title': '/etc/chrony.conf'}]}, 'actor': 'check_chrony', 'summary': 'default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives', 'audience': 'sysadmin', 'key': 'c4222ebd18730a76f6bc7b3b66df898b106e6554', 'id': 'dac30f248198b8463c2f5c4eeb659d3d2c4bd234a358d43a13c1f1bdcc5f2bbb', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_chrony", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "ntpd"}, {"scheme": "package", "title": "chrony"}, {"scheme": "file", "title": "/etc/chrony.conf"}]}, "groups": ["services", "time management"], "hostname": "managed-node01", "id": "dac30f248198b8463c2f5c4eeb659d3d2c4bd234a358d43a13c1f1bdcc5f2bbb", "key": "c4222ebd18730a76f6bc7b3b66df898b106e6554", "severity": "medium", "summary": "default chrony configuration in RHEL8 uses leapsectz directive, which cannot be used with leap smearing NTP servers, and uses a single pool directive instead of four server directives", "timeStamp": "2025-11-13T21:38:35.847942Z", "title": "chrony using default configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['filesystem'], 'title': 'Detected broken systemd symlinks for non-existing services', 'timeStamp': '2025-11-13T21:38:35.996995Z', 'hostname': 'managed-node01', 'detail': {'remediations': [{'type': 'hint', 'context': 'Remove the invalid symlinks before the upgrade.'}, {'type': 'command', 'context': ['/usr/bin/rm', '/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service']}]}, 'actor': 'check_systemd_broken_symlinks', 'summary': 'Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service', 'audience': 'sysadmin', 'key': 'be2083fee03f5f0a708fd193d82d2fe20aee7217', 'id': 'c439366ebcb1d31cd2a1489e5adad8cd6912c75a31b797a59420a8e8e8ac5b49', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_systemd_broken_symlinks", "audience": "sysadmin", "detail": {"remediations": [{"context": "Remove the invalid symlinks before the upgrade.", "type": "hint"}, {"context": ["/usr/bin/rm", "/etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service"], "type": "command"}]}, "groups": ["filesystem"], "hostname": "managed-node01", "id": "c439366ebcb1d31cd2a1489e5adad8cd6912c75a31b797a59420a8e8e8ac5b49", "key": "be2083fee03f5f0a708fd193d82d2fe20aee7217", "severity": "low", "summary": "Leapp detected broken systemd symlinks on the system that do not correspond to any installed systemd unit. This typically happens when the original systemd unit file has been removed (e.g. an rpm removal) or renamed and the system configration has not been properly modified. These symlinks will not be handled during the in-place upgrade as they are already broken. The list of detected broken systemd symlinks:\n - /etc/systemd/system/multi-user.target.wants/ovirt-guest-agent.service", "timeStamp": "2025-11-13T21:38:35.996995Z", "title": "Detected broken systemd symlinks for non-existing services"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['repository'], 'title': 'Some enabled RPM repositories are unknown to Leapp', 'timeStamp': '2025-11-13T21:38:36.104584Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'python3-libs'}, {'scheme': 'package', 'title': 'perl-libs'}, {'scheme': 'package', 'title': 'perl-XML-Twig'}, {'scheme': 'package', 'title': 'perl-HTML-Tagset'}, {'scheme': 'package', 'title': 'perl-parent'}, {'scheme': 'package', 'title': 'efivar-libs'}, {'scheme': 'package', 'title': 'perl-Time-HiRes'}, {'scheme': 'package', 'title': 'perl-HTTP-Cookies'}, {'scheme': 'package', 'title': 'vim-common'}, {'scheme': 'package', 'title': 'perl-Pod-Perldoc'}, {'scheme': 'package', 'title': 'libsolv'}, {'scheme': 'package', 'title': 'perl-macros'}, {'scheme': 'package', 'title': 'perl-IO-Compress'}, {'scheme': 'package', 'title': 'python-slip-dbus'}, {'scheme': 'package', 'title': 'perl-HTTP-Date'}, {'scheme': 'package', 'title': 'ruby-libs'}, {'scheme': 'package', 'title': 'perl-XML-NamespaceSupport'}, {'scheme': 'package', 'title': 'rubygems'}, {'scheme': 'package', 'title': 'grub2-efi-x64-modules'}, {'scheme': 'package', 'title': 'perl-HTTP-Message'}, {'scheme': 'package', 'title': 'ipset'}, {'scheme': 'package', 'title': 'perl-Socket'}, {'scheme': 'package', 'title': 'rubygem-psych'}, {'scheme': 'package', 'title': 'libdrm'}, {'scheme': 'package', 'title': 'perl-Time-Local'}, {'scheme': 'package', 'title': 'rubygem-bigdecimal'}, {'scheme': 'package', 'title': 'perl-File-Temp'}, {'scheme': 'package', 'title': 'python3'}, {'scheme': 'package', 'title': 'perl-Text-ParseWords'}, {'scheme': 'package', 'title': 'gpm-libs'}, {'scheme': 'package', 'title': 'perl-LWP-MediaTypes'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Zlib'}, {'scheme': 'package', 'title': 'perl-TermReadKey'}, {'scheme': 'package', 'title': 'perl-threads'}, {'scheme': 'package', 'title': 'perl-File-Listing'}, {'scheme': 'package', 'title': 'rubygem-rdoc'}, {'scheme': 'package', 'title': 'perl-Scalar-List-Utils'}, {'scheme': 'package', 'title': 'perl-HTTP-Tiny'}, {'scheme': 'package', 'title': 'perl-XML-SAX'}, {'scheme': 'package', 'title': 'perl-LWP-Protocol-https'}, {'scheme': 'package', 'title': 'vim-filesystem'}, {'scheme': 'package', 'title': 'perl-IO-Zlib'}, {'scheme': 'package', 'title': 'rng-tools'}, {'scheme': 'package', 'title': 'libpciaccess'}, {'scheme': 'package', 'title': 'perl-Mozilla-CA'}, {'scheme': 'package', 'title': 'python-firewall'}, {'scheme': 'package', 'title': 'json-glib'}, {'scheme': 'package', 'title': 'perl-threads-shared'}, {'scheme': 'package', 'title': 'mailcap'}, {'scheme': 'package', 'title': 'perl-Business-ISBN-Data'}, {'scheme': 'package', 'title': 'perl-Encode'}, {'scheme': 'package', 'title': 'perl-Carp'}, {'scheme': 'package', 'title': 'linux-firmware'}, {'scheme': 'package', 'title': 'perl-HTTP-Negotiate'}, {'scheme': 'package', 'title': 'rubygem-io-console'}, {'scheme': 'package', 'title': 'perl-Data-Dumper'}, {'scheme': 'package', 'title': 'perl-Exporter'}, {'scheme': 'package', 'title': 'aic94xx-firmware'}, {'scheme': 'package', 'title': 'wget'}, {'scheme': 'package', 'title': 'vim-enhanced'}, {'scheme': 'package', 'title': 'perl-libwww-perl'}, {'scheme': 'package', 'title': 'perl-URI'}, {'scheme': 'package', 'title': 'perl-Module-Load'}, {'scheme': 'package', 'title': 'perl-XML-LibXML'}, {'scheme': 'package', 'title': 'perl-File-Path'}, {'scheme': 'package', 'title': 'perl-Encode-Locale'}, {'scheme': 'package', 'title': 'perl-XML-SAX-Base'}, {'scheme': 'package', 'title': 'perl-XML-Parser'}, {'scheme': 'package', 'title': 'iprutils'}, {'scheme': 'package', 'title': 'biosdevname'}, {'scheme': 'package', 'title': 'perl-FCGI'}, {'scheme': 'package', 'title': 'perl-TimeDate'}, {'scheme': 'package', 'title': 'mokutil'}, {'scheme': 'package', 'title': 'git'}, {'scheme': 'package', 'title': 'perl-Compress-Raw-Bzip2'}, {'scheme': 'package', 'title': 'perl'}, {'scheme': 'package', 'title': 'perl-Font-AFM'}, {'scheme': 'package', 'title': 'fxload'}, {'scheme': 'package', 'title': 'perl-Storable'}, {'scheme': 'package', 'title': 'perl-Digest-MD5'}, {'scheme': 'package', 'title': 'plymouth-core-libs'}, {'scheme': 'package', 'title': 'libreport-filesystem'}, {'scheme': 'package', 'title': 'perl-Getopt-Long'}, {'scheme': 'package', 'title': 'perl-HTML-Tree'}, {'scheme': 'package', 'title': 'perl-IO-HTML'}, {'scheme': 'package', 'title': 'ruby'}, {'scheme': 'package', 'title': 'perl-PathTools'}, {'scheme': 'package', 'title': 'perl-HTML-Parser'}, {'scheme': 'package', 'title': 'ipset-libs'}, {'scheme': 'package', 'title': 'perl-Net-LibIDN'}, {'scheme': 'package', 'title': 'perl-Git'}, {'scheme': 'package', 'title': 'firewalld'}, {'scheme': 'package', 'title': 'plymouth'}, {'scheme': 'package', 'title': 'perl-CGI'}, {'scheme': 'package', 'title': 'python3-setuptools'}, {'scheme': 'package', 'title': 'perl-WWW-RobotRules'}, {'scheme': 'package', 'title': 'firewalld-filesystem'}, {'scheme': 'package', 'title': 'shim-x64'}, {'scheme': 'package', 'title': 'ruby-irb'}, {'scheme': 'package', 'title': 'perl-Pod-Simple'}, {'scheme': 'package', 'title': 'perl-Error'}, {'scheme': 'package', 'title': 'perl-HTML-Format'}, {'scheme': 'package', 'title': 'lsscsi'}, {'scheme': 'package', 'title': 'perl-HTTP-Daemon'}, {'scheme': 'package', 'title': 'alsa-lib'}, {'scheme': 'package', 'title': 'redhat-logos'}, {'scheme': 'package', 'title': 'rubygem-json'}, {'scheme': 'package', 'title': 'perl-Date-Manip'}, {'scheme': 'package', 'title': 'perl-Net-HTTP'}, {'scheme': 'package', 'title': 'perl-Digest'}, {'scheme': 'package', 'title': 'perl-IO-Socket-SSL'}, {'scheme': 'package', 'title': 'ebtables'}, {'scheme': 'package', 'title': 'plymouth-scripts'}, {'scheme': 'package', 'title': 'perl-IO-stringy'}, {'scheme': 'package', 'title': 'time'}, {'scheme': 'package', 'title': 'perl-podlators'}, {'scheme': 'package', 'title': 'perl-constant'}, {'scheme': 'package', 'title': 'perl-Pod-Escapes'}, {'scheme': 'package', 'title': 'perl-Net-SSLeay'}, {'scheme': 'package', 'title': 'perl-Business-ISBN'}, {'scheme': 'package', 'title': 'alsa-tools-firmware'}, {'scheme': 'package', 'title': 'perl-Filter'}, {'scheme': 'package', 'title': 'librepo'}, {'scheme': 'package', 'title': 'perl-Pod-Usage'}, {'scheme': 'package', 'title': 'python-slip'}, {'scheme': 'package', 'title': 'alsa-firmware'}, {'scheme': 'package', 'title': 'perl-IO-Socket-IP'}, {'scheme': 'package', 'title': 'python3-pip'}, {'scheme': 'repository', 'title': 'rhel-Server'}], 'remediations': [{'type': 'hint', 'context': 'You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket'}]}, 'actor': 'check_skipped_repositories', 'summary': 'The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip', 'audience': 'sysadmin', 'key': '8e89e20c645cea600b240156071d81c64daab7ad', 'id': 'd66b19e3d900c6df6e90eef949c19fefec97796d88bda578a380e5b445b11a82', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "check_skipped_repositories", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "python3-libs"}, {"scheme": "package", "title": "perl-libs"}, {"scheme": "package", "title": "perl-XML-Twig"}, {"scheme": "package", "title": "perl-HTML-Tagset"}, {"scheme": "package", "title": "perl-parent"}, {"scheme": "package", "title": "efivar-libs"}, {"scheme": "package", "title": "perl-Time-HiRes"}, {"scheme": "package", "title": "perl-HTTP-Cookies"}, {"scheme": "package", "title": "vim-common"}, {"scheme": "package", "title": "perl-Pod-Perldoc"}, {"scheme": "package", "title": "libsolv"}, {"scheme": "package", "title": "perl-macros"}, {"scheme": "package", "title": "perl-IO-Compress"}, {"scheme": "package", "title": "python-slip-dbus"}, {"scheme": "package", "title": "perl-HTTP-Date"}, {"scheme": "package", "title": "ruby-libs"}, {"scheme": "package", "title": "perl-XML-NamespaceSupport"}, {"scheme": "package", "title": "rubygems"}, {"scheme": "package", "title": "grub2-efi-x64-modules"}, {"scheme": "package", "title": "perl-HTTP-Message"}, {"scheme": "package", "title": "ipset"}, {"scheme": "package", "title": "perl-Socket"}, {"scheme": "package", "title": "rubygem-psych"}, {"scheme": "package", "title": "libdrm"}, {"scheme": "package", "title": "perl-Time-Local"}, {"scheme": "package", "title": "rubygem-bigdecimal"}, {"scheme": "package", "title": "perl-File-Temp"}, {"scheme": "package", "title": "python3"}, {"scheme": "package", "title": "perl-Text-ParseWords"}, {"scheme": "package", "title": "gpm-libs"}, {"scheme": "package", "title": "perl-LWP-MediaTypes"}, {"scheme": "package", "title": "perl-Compress-Raw-Zlib"}, {"scheme": "package", "title": "perl-TermReadKey"}, {"scheme": "package", "title": "perl-threads"}, {"scheme": "package", "title": "perl-File-Listing"}, {"scheme": "package", "title": "rubygem-rdoc"}, {"scheme": "package", "title": "perl-Scalar-List-Utils"}, {"scheme": "package", "title": "perl-HTTP-Tiny"}, {"scheme": "package", "title": "perl-XML-SAX"}, {"scheme": "package", "title": "perl-LWP-Protocol-https"}, {"scheme": "package", "title": "vim-filesystem"}, {"scheme": "package", "title": "perl-IO-Zlib"}, {"scheme": "package", "title": "rng-tools"}, {"scheme": "package", "title": "libpciaccess"}, {"scheme": "package", "title": "perl-Mozilla-CA"}, {"scheme": "package", "title": "python-firewall"}, {"scheme": "package", "title": "json-glib"}, {"scheme": "package", "title": "perl-threads-shared"}, {"scheme": "package", "title": "mailcap"}, {"scheme": "package", "title": "perl-Business-ISBN-Data"}, {"scheme": "package", "title": "perl-Encode"}, {"scheme": "package", "title": "perl-Carp"}, {"scheme": "package", "title": "linux-firmware"}, {"scheme": "package", "title": "perl-HTTP-Negotiate"}, {"scheme": "package", "title": "rubygem-io-console"}, {"scheme": "package", "title": "perl-Data-Dumper"}, {"scheme": "package", "title": "perl-Exporter"}, {"scheme": "package", "title": "aic94xx-firmware"}, {"scheme": "package", "title": "wget"}, {"scheme": "package", "title": "vim-enhanced"}, {"scheme": "package", "title": "perl-libwww-perl"}, {"scheme": "package", "title": "perl-URI"}, {"scheme": "package", "title": "perl-Module-Load"}, {"scheme": "package", "title": "perl-XML-LibXML"}, {"scheme": "package", "title": "perl-File-Path"}, {"scheme": "package", "title": "perl-Encode-Locale"}, {"scheme": "package", "title": "perl-XML-SAX-Base"}, {"scheme": "package", "title": "perl-XML-Parser"}, {"scheme": "package", "title": "iprutils"}, {"scheme": "package", "title": "biosdevname"}, {"scheme": "package", "title": "perl-FCGI"}, {"scheme": "package", "title": "perl-TimeDate"}, {"scheme": "package", "title": "mokutil"}, {"scheme": "package", "title": "git"}, {"scheme": "package", "title": "perl-Compress-Raw-Bzip2"}, {"scheme": "package", "title": "perl"}, {"scheme": "package", "title": "perl-Font-AFM"}, {"scheme": "package", "title": "fxload"}, {"scheme": "package", "title": "perl-Storable"}, {"scheme": "package", "title": "perl-Digest-MD5"}, {"scheme": "package", "title": "plymouth-core-libs"}, {"scheme": "package", "title": "libreport-filesystem"}, {"scheme": "package", "title": "perl-Getopt-Long"}, {"scheme": "package", "title": "perl-HTML-Tree"}, {"scheme": "package", "title": "perl-IO-HTML"}, {"scheme": "package", "title": "ruby"}, {"scheme": "package", "title": "perl-PathTools"}, {"scheme": "package", "title": "perl-HTML-Parser"}, {"scheme": "package", "title": "ipset-libs"}, {"scheme": "package", "title": "perl-Net-LibIDN"}, {"scheme": "package", "title": "perl-Git"}, {"scheme": "package", "title": "firewalld"}, {"scheme": "package", "title": "plymouth"}, {"scheme": "package", "title": "perl-CGI"}, {"scheme": "package", "title": "python3-setuptools"}, {"scheme": "package", "title": "perl-WWW-RobotRules"}, {"scheme": "package", "title": "firewalld-filesystem"}, {"scheme": "package", "title": "shim-x64"}, {"scheme": "package", "title": "ruby-irb"}, {"scheme": "package", "title": "perl-Pod-Simple"}, {"scheme": "package", "title": "perl-Error"}, {"scheme": "package", "title": "perl-HTML-Format"}, {"scheme": "package", "title": "lsscsi"}, {"scheme": "package", "title": "perl-HTTP-Daemon"}, {"scheme": "package", "title": "alsa-lib"}, {"scheme": "package", "title": "redhat-logos"}, {"scheme": "package", "title": "rubygem-json"}, {"scheme": "package", "title": "perl-Date-Manip"}, {"scheme": "package", "title": "perl-Net-HTTP"}, {"scheme": "package", "title": "perl-Digest"}, {"scheme": "package", "title": "perl-IO-Socket-SSL"}, {"scheme": "package", "title": "ebtables"}, {"scheme": "package", "title": "plymouth-scripts"}, {"scheme": "package", "title": "perl-IO-stringy"}, {"scheme": "package", "title": "time"}, {"scheme": "package", "title": "perl-podlators"}, {"scheme": "package", "title": "perl-constant"}, {"scheme": "package", "title": "perl-Pod-Escapes"}, {"scheme": "package", "title": "perl-Net-SSLeay"}, {"scheme": "package", "title": "perl-Business-ISBN"}, {"scheme": "package", "title": "alsa-tools-firmware"}, {"scheme": "package", "title": "perl-Filter"}, {"scheme": "package", "title": "librepo"}, {"scheme": "package", "title": "perl-Pod-Usage"}, {"scheme": "package", "title": "python-slip"}, {"scheme": "package", "title": "alsa-firmware"}, {"scheme": "package", "title": "perl-IO-Socket-IP"}, {"scheme": "package", "title": "python3-pip"}, {"scheme": "repository", "title": "rhel-Server"}], "remediations": [{"context": "You can file a request to add this repository to the scope of in-place upgrades by filing a support ticket", "type": "hint"}]}, "groups": ["repository"], "hostname": "managed-node01", "id": "d66b19e3d900c6df6e90eef949c19fefec97796d88bda578a380e5b445b11a82", "key": "8e89e20c645cea600b240156071d81c64daab7ad", "severity": "low", "summary": "The following repositories with Red Hat-signed packages are unknown to Leapp:\n- rhel-Server\nAnd the following packages installed from those repositories may not be upgraded:\n- python3-libs\n- perl-libs\n- perl-XML-Twig\n- perl-HTML-Tagset\n- perl-parent\n- efivar-libs\n- perl-Time-HiRes\n- perl-HTTP-Cookies\n- vim-common\n- perl-Pod-Perldoc\n- libsolv\n- perl-macros\n- perl-IO-Compress\n- python-slip-dbus\n- perl-HTTP-Date\n- ruby-libs\n- perl-XML-NamespaceSupport\n- rubygems\n- grub2-efi-x64-modules\n- perl-HTTP-Message\n- ipset\n- perl-Socket\n- rubygem-psych\n- libdrm\n- perl-Time-Local\n- rubygem-bigdecimal\n- perl-File-Temp\n- python3\n- perl-Text-ParseWords\n- gpm-libs\n- perl-LWP-MediaTypes\n- perl-Compress-Raw-Zlib\n- perl-TermReadKey\n- perl-threads\n- perl-File-Listing\n- rubygem-rdoc\n- perl-Scalar-List-Utils\n- perl-HTTP-Tiny\n- perl-XML-SAX\n- perl-LWP-Protocol-https\n- vim-filesystem\n- perl-IO-Zlib\n- rng-tools\n- libpciaccess\n- perl-Mozilla-CA\n- python-firewall\n- json-glib\n- perl-threads-shared\n- mailcap\n- perl-Business-ISBN-Data\n- perl-Encode\n- perl-Carp\n- linux-firmware\n- perl-HTTP-Negotiate\n- rubygem-io-console\n- perl-Data-Dumper\n- perl-Exporter\n- aic94xx-firmware\n- wget\n- vim-enhanced\n- perl-libwww-perl\n- perl-URI\n- perl-Module-Load\n- perl-XML-LibXML\n- perl-File-Path\n- perl-Encode-Locale\n- perl-XML-SAX-Base\n- perl-XML-Parser\n- iprutils\n- biosdevname\n- perl-FCGI\n- perl-TimeDate\n- mokutil\n- git\n- perl-Compress-Raw-Bzip2\n- perl\n- perl-Font-AFM\n- fxload\n- perl-Storable\n- perl-Digest-MD5\n- plymouth-core-libs\n- libreport-filesystem\n- perl-Getopt-Long\n- perl-HTML-Tree\n- perl-IO-HTML\n- ruby\n- perl-PathTools\n- perl-HTML-Parser\n- ipset-libs\n- perl-Net-LibIDN\n- perl-Git\n- firewalld\n- plymouth\n- perl-CGI\n- python3-setuptools\n- perl-WWW-RobotRules\n- firewalld-filesystem\n- shim-x64\n- ruby-irb\n- perl-Pod-Simple\n- perl-Error\n- perl-HTML-Format\n- lsscsi\n- perl-HTTP-Daemon\n- alsa-lib\n- redhat-logos\n- rubygem-json\n- perl-Date-Manip\n- perl-Net-HTTP\n- perl-Digest\n- perl-IO-Socket-SSL\n- ebtables\n- plymouth-scripts\n- perl-IO-stringy\n- time\n- perl-podlators\n- perl-constant\n- perl-Pod-Escapes\n- perl-Net-SSLeay\n- perl-Business-ISBN\n- alsa-tools-firmware\n- perl-Filter\n- librepo\n- perl-Pod-Usage\n- python-slip\n- alsa-firmware\n- perl-IO-Socket-IP\n- python3-pip", "timeStamp": "2025-11-13T21:38:36.104584Z", "title": "Some enabled RPM repositories are unknown to Leapp"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['authentication', 'security', 'tools'], 'title': 'Module pam_pkcs11 will be removed from PAM configuration', 'timeStamp': '2025-11-13T21:38:36.177942Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'sssd'}], 'remediations': [{'type': 'hint', 'context': 'Configure SSSD to replace pam_pkcs11'}]}, 'actor': 'removed_pam_modules_check', 'summary': 'Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.', 'audience': 'sysadmin', 'key': 'bf47e7305d6805e8bbeaa7593cf01e38030c23f3', 'id': 'be213252addaffdf5ff2d280d71345f58bc81c3f61c911d3a68b908b0774d305', 'severity': 'medium'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "removed_pam_modules_check", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "sssd"}], "remediations": [{"context": "Configure SSSD to replace pam_pkcs11", "type": "hint"}]}, "groups": ["authentication", "security", "tools"], "hostname": "managed-node01", "id": "be213252addaffdf5ff2d280d71345f58bc81c3f61c911d3a68b908b0774d305", "key": "bf47e7305d6805e8bbeaa7593cf01e38030c23f3", "severity": "medium", "summary": "Module pam_pkcs11 was surpassed by SSSD and therefore it was removed from RHEL-8. Keeping it in PAM configuration may lock out the system thus it will be automatically removed from PAM configuration before upgrading to RHEL-8. Please switch to SSSD to recover the functionality of pam_pkcs11.", "timeStamp": "2025-11-13T21:38:36.177942Z", "title": "Module pam_pkcs11 will be removed from PAM configuration"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['tools'], 'title': 'Grep has incompatible changes in the next major version', 'timeStamp': '2025-11-13T21:38:36.720616Z', 'hostname': 'managed-node01', 'detail': {'related_resources': [{'scheme': 'package', 'title': 'grep'}], 'remediations': [{'type': 'hint', 'context': 'Please update your scripts to be compatible with the changes.'}]}, 'actor': 'checkgrep', 'summary': 'If a file contains data improperly encoded for the current locale, and this is discovered before any of the file\'s contents are output, grep now treats the file as binary.\nThe \'grep -P\' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe \'grep -z\' no longer automatically treats the byte \'\\200\' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, \'grep "^" -m1 -A1\' now outputs the first two input lines, not just the first line.\n', 'audience': 'sysadmin', 'key': '94665a499e2eeee35eca3e7093a7abe183384b16', 'id': '6712ac5e9241f02d1d86a30fbbf460fc08a687260dd43d7101a57b5421386000', 'severity': 'low'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "checkgrep", "audience": "sysadmin", "detail": {"related_resources": [{"scheme": "package", "title": "grep"}], "remediations": [{"context": "Please update your scripts to be compatible with the changes.", "type": "hint"}]}, "groups": ["tools"], "hostname": "managed-node01", "id": "6712ac5e9241f02d1d86a30fbbf460fc08a687260dd43d7101a57b5421386000", "key": "94665a499e2eeee35eca3e7093a7abe183384b16", "severity": "low", "summary": "If a file contains data improperly encoded for the current locale, and this is discovered before any of the file's contents are output, grep now treats the file as binary.\nThe 'grep -P' no longer reports an error and exits when given invalid UTF-8 data. Instead, it considers the data to be non-matching.\nIn locales with multibyte character encodings other than UTF-8, grep -P now reports an error and exits instead of misbehaving.\nWhen searching binary data, grep now may treat non-text bytes as line terminators. This can boost performance significantly.\nThe 'grep -z' no longer automatically treats the byte '\\200' as binary data.\nContext no longer excludes selected lines omitted because of -m. For example, 'grep \"^\" -m1 -A1' now outputs the first two input lines, not just the first line.\n", "timeStamp": "2025-11-13T21:38:36.720616Z", "title": "Grep has incompatible changes in the next major version"}, "skip_reason": "Conditional result was False"} skipping: [managed-node01] => (item={'groups': ['sanity'], 'title': 'Packages not signed by Red Hat found on the system', 'timeStamp': '2025-11-13T21:38:36.879667Z', 'hostname': 'managed-node01', 'actor': 'red_hat_signed_rpm_check', 'summary': 'The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel', 'audience': 'sysadmin', 'key': '13f0791ae5f19f50e7d0d606fb6501f91b1efb2c', 'id': '657489a37b48ea949f2f14f0c6589c80e95d4da7849c91f8d3ce257efdcec925', 'severity': 'high'}) => {"ansible_loop_var": "item", "changed": false, "item": {"actor": "red_hat_signed_rpm_check", "audience": "sysadmin", "groups": ["sanity"], "hostname": "managed-node01", "id": "657489a37b48ea949f2f14f0c6589c80e95d4da7849c91f8d3ce257efdcec925", "key": "13f0791ae5f19f50e7d0d606fb6501f91b1efb2c", "severity": "high", "summary": "The following packages have not been signed by Red Hat and may be removed during the upgrade process in case Red Hat-signed packages to be removed during the upgrade depend on them:\n- beakerlib\n- beakerlib-redhat\n- epel-release\n- restraint\n- restraint-rhts\n- tps-devel", "timeStamp": "2025-11-13T21:38:36.879667Z", "title": "Packages not signed by Red Hat found on the system"}, "skip_reason": "Conditional result was False"} TASK [infra.leapp.common : parse_leapp_report | Collect inhibitors] ************ task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:44 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/\\(inhibitor\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004465", "end": "2025-11-13 16:39:07.140341", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:39:07.135876", "stderr": "", "stderr_lines": [], "stdout": "Risk Factor: high (inhibitor)\nTitle: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\nSummary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:\n - pata_acpi\n\nRelated links:\n - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716\n - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131\nKey: f08a07da902958defa4f5c2699fae9ec2eb67c5b\n----------------------------------------", "stdout_lines": ["Risk Factor: high (inhibitor)", "Title: Leapp detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.", "Summary: Support for the following RHEL 7 device drivers has been removed in RHEL 8:", " - pata_acpi", "", "Related links:", " - Leapp preupgrade getting \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\" : https://access.redhat.com/solutions/6971716", " - Leapp upgrade fail with error \"Inhibitor: Detected loaded kernel drivers which have been removed in RHEL 8. Upgrade cannot proceed.\": https://access.redhat.com/solutions/5436131", "Key: f08a07da902958defa4f5c2699fae9ec2eb67c5b", "----------------------------------------"]} TASK [infra.leapp.common : parse_leapp_report | Collect high errors] *********** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/common/tasks/parse_leapp_report.yml:53 ok: [managed-node01] => {"changed": false, "cmd": ["awk", "/high \\(error\\)/,/^-------/", "/var/log/leapp/leapp-report.txt"], "delta": "0:00:00.004304", "end": "2025-11-13 16:39:07.409480", "failed_when_result": false, "msg": "", "rc": 0, "start": "2025-11-13 16:39:07.405176", "stderr": "", "stderr_lines": [], "stdout": "", "stdout_lines": []} TASK [infra.leapp.upgrade : leapp-upgrade | Verify no inhibitor results found during preupgrade] *** task path: /root/.ansible/collections/ansible_collections/infra/leapp/roles/upgrade/tasks/leapp-upgrade.yml:8 fatal: [managed-node01]: FAILED! => { "assertion": "not upgrade_inhibited", "changed": false, "evaluated_to": false, "msg": "Inhibitors found, please investigate and rerun analysis." } TASK [Cleanup | Remove log files] ********************************************** task path: /root/.ansible/collections/ansible_collections/infra/leapp/tests/tests_upgrade_custom_7to8.yml:59 changed: [managed-node01] => {"changed": true, "cmd": "set -euxo pipefail\nrm -f /var/log/leapp/leapp-upgrade.log\nrm -f /var/log/ripu/ripu.log*\n", "delta": "0:00:00.004996", "end": "2025-11-13 16:39:07.703867", "msg": "", "rc": 0, "start": "2025-11-13 16:39:07.698871", "stderr": "+ rm -f /var/log/leapp/leapp-upgrade.log\n+ rm -f /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251113T163455", "stderr_lines": ["+ rm -f /var/log/leapp/leapp-upgrade.log", "+ rm -f /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251113T163455"], "stdout": "", "stdout_lines": []} PLAY RECAP ********************************************************************* managed-node01 : ok=120 changed=24 unreachable=0 failed=1 skipped=41 rescued=1 ignored=0 -- Logs begin at Thu 2025-11-13 16:31:10 EST, end at Thu 2025-11-13 16:39:08 EST. -- Nov 13 16:34:54 managed-node01 sshd[3879]: Accepted publickey for root from 10.31.14.245 port 40558 ssh2: ECDSA SHA256:QRo2J9Rtsx+XPa157lxB8Uss34lEsivmmGqzs1GTYmg Nov 13 16:34:54 managed-node01 systemd[1]: Started Session 6 of user root. -- Subject: Unit session-6.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-6.scope has finished starting up. -- -- The start-up result is done. Nov 13 16:34:54 managed-node01 systemd-logind[540]: New session 6 of user root. -- Subject: A new session 6 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 6 has been created for the user root. -- -- The leading process of the session is 3879. Nov 13 16:34:54 managed-node01 sshd[3879]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 13 16:34:54 managed-node01 ansible-ansible.legacy.setup[3950]: Invoked with filter=[] gather_subset=['all'] fact_path=/etc/ansible/facts.d gather_timeout=10 Nov 13 16:34:56 managed-node01 ansible-ansible.builtin.stat[4040]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-upgrade.log get_md5=False get_mime=True get_attributes=True Nov 13 16:34:56 managed-node01 ansible-ansible.builtin.file[4101]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/ripu owner=root follow=True attributes=None mode=0755 Nov 13 16:34:57 managed-node01 ansible-ansible.builtin.stat[4162]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:34:57 managed-node01 ansible-ansible.legacy.stat[4223]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/ripu/ripu.log follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:34:57 managed-node01 ansible-ansible.legacy.copy[4269]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1763069697.2641752-6194-281087798305080/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/ripu/ripu.log seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpszrzldkp serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=8f20155a9e12b6dd86656e5e1fd4d6f91b1f5637 backup=False local_follow=None Nov 13 16:34:58 managed-node01 ansible-ansible.builtin.file[4330]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/ansible/facts.d owner=root follow=True attributes=None mode=0755 Nov 13 16:34:58 managed-node01 ansible-ansible.legacy.stat[4391]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/pre_ripu.fact follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:34:58 managed-node01 ansible-ansible.legacy.copy[4437]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1763069698.4923146-6281-114013013782185/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/etc/ansible/facts.d/pre_ripu.fact seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmp69n81obq serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=40eb5afb1d7d22515dc739978336696eddc582de backup=False local_follow=None Nov 13 16:34:59 managed-node01 ansible-ansible.legacy.command[4498]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:35:00 managed-node01 ansible-ansible.legacy.stat[4564]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/non_rhel_packages.fact follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:35:00 managed-node01 ansible-ansible.legacy.copy[4610]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1763069699.8873239-6422-68292750845448/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/etc/ansible/facts.d/non_rhel_packages.fact seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpn9ucrs0c serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=6d36b22d9c2b2f366fc090edfbac427c77d524a5 backup=False local_follow=None Nov 13 16:35:01 managed-node01 ansible-ansible.builtin.yum_repository[4671]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=rhel7_extras owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=RHEL 7 Server Extras retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['https://download.eng.brq.redhat.com/rhel-7/nightly/EXTRAS-7/latest-EXTRAS-7.9-RHEL-7/compose/Server/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-7-server-extras-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Nov 13 16:35:02 managed-node01 ansible-ansible.legacy.yum[4732]: Invoked with lock_timeout=30 update_cache=False conf_file=None exclude=[] allow_downgrade=False sslverify=True disable_gpg_check=False disable_excludes=None use_backend=auto validate_certs=True state=latest disablerepo=[] releasever=None skip_broken=False cacheonly=False autoremove=False download_dir=None installroot=/ install_weak_deps=True name=['leapp-upgrade'] download_only=False bugfix=False list=None install_repoquery=True update_only=False disable_plugin=[] enablerepo=['rhel-7-server-extras-rpms'] security=False enable_plugin=[] Nov 13 16:35:09 managed-node01 yum[4746]: Installed: json-glib-1.4.2-2.el7.x86_64 Nov 13 16:35:09 managed-node01 yum[4746]: Installed: libmodulemd-1.6.3-1.el7.x86_64 Nov 13 16:35:09 managed-node01 yum[4746]: Installed: librhsm-0.0.3-3.el7_9.x86_64 Nov 13 16:35:09 managed-node01 yum[4746]: Installed: librepo-1.8.1-8.el7_9.x86_64 Nov 13 16:35:09 managed-node01 yum[4746]: Installed: libsolv-0.6.34-4.el7.x86_64 Nov 13 16:35:09 managed-node01 yum[4746]: Installed: libdnf-0.22.5-2.el7_9.x86_64 Nov 13 16:35:09 managed-node01 yum[4746]: Installed: python2-libdnf-0.22.5-2.el7_9.x86_64 Nov 13 16:35:09 managed-node01 yum[4746]: Installed: python2-hawkey-0.22.5-2.el7_9.x86_64 Nov 13 16:35:09 managed-node01 yum[4746]: Installed: leapp-deps-0.17.0-2.el7_9.noarch Nov 13 16:35:10 managed-node01 yum[4746]: Installed: python2-leapp-0.17.0-2.el7_9.noarch Nov 13 16:35:10 managed-node01 yum[4746]: Installed: libcomps-0.1.8-14.el7.x86_64 Nov 13 16:35:10 managed-node01 yum[4746]: Installed: python2-libcomps-0.1.8-14.el7.x86_64 Nov 13 16:35:10 managed-node01 yum[4746]: Installed: libreport-filesystem-2.1.11-53.el7.x86_64 Nov 13 16:35:10 managed-node01 yum[4746]: Installed: dnf-data-4.0.9.2-2.el7_9.noarch Nov 13 16:35:10 managed-node01 yum[4746]: Installed: python2-dnf-4.0.9.2-2.el7_9.noarch Nov 13 16:35:10 managed-node01 systemd[1]: Reloading. Nov 13 16:35:10 managed-node01 yum[4746]: Installed: dnf-4.0.9.2-2.el7_9.noarch Nov 13 16:35:10 managed-node01 yum[4746]: Installed: leapp-upgrade-el7toel8-deps-0.20.0-9.el7_9.noarch Nov 13 16:35:10 managed-node01 yum[4746]: Installed: leapp-0.17.0-2.el7_9.noarch Nov 13 16:35:11 managed-node01 yum[4746]: Installed: leapp-upgrade-el7toel8-0.20.0-9.el7_9.noarch Nov 13 16:35:12 managed-node01 ansible-ansible.builtin.file[4859]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/leapp owner=root follow=True attributes=None mode=0700 Nov 13 16:35:12 managed-node01 ansible-ansible.legacy.stat[4920]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/leapp/answerfile follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:35:12 managed-node01 ansible-ansible.legacy.copy[4966]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1763069712.3076718-6724-229148528971375/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/leapp/answerfile seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpiu62a5t1 serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=3d934ad808576e3a7fb4c14a89645a4ad55ccf53 backup=False local_follow=None Nov 13 16:35:13 managed-node01 ansible-ansible.builtin.file[5027]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=absent access_time_format=%Y%m%d%H%M.%S group=None modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/leapp/files/leapp_upgrade_repositories.repo owner=None follow=True attributes=None mode=None Nov 13 16:35:13 managed-node01 ansible-ansible.builtin.yum_repository[5088]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=/etc/leapp/files/leapp_upgrade_repositories owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=BaseOS for x86_64 retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-8-for-x86_64-baseos-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Nov 13 16:35:13 managed-node01 ansible-ansible.builtin.yum_repository[5149]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=/etc/leapp/files/leapp_upgrade_repositories owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=AppStream for x86_64 retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-8-for-x86_64-appstream-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Nov 13 16:35:14 managed-node01 ansible-async_wrapper.py[5217]: Invoked with j175707545213 7200 /root/.ansible/tmp/ansible-tmp-1763069713.7040672-6770-176479641544286/AnsiballZ_command.py _ Nov 13 16:35:14 managed-node01 ansible-async_wrapper.py[5220]: Starting module and watcher Nov 13 16:35:14 managed-node01 ansible-async_wrapper.py[5220]: Start watching 5221 (7200) Nov 13 16:35:14 managed-node01 ansible-async_wrapper.py[5221]: Start module (5221) Nov 13 16:35:14 managed-node01 ansible-async_wrapper.py[5217]: Return async_wrapper task started. Nov 13 16:35:14 managed-node01 ansible-ansible.legacy.command[5222]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:35:19 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7200) Nov 13 16:35:24 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7195) Nov 13 16:35:29 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7190) Nov 13 16:35:34 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7185) Nov 13 16:35:39 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7180) Nov 13 16:35:44 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7175) Nov 13 16:35:49 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7170) Nov 13 16:35:54 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7165) Nov 13 16:35:54 managed-node01 systemd[1]: Got automount request for /proc/sys/fs/binfmt_misc, triggered by 7915 (sysctl) Nov 13 16:35:54 managed-node01 systemd[1]: Mounting Arbitrary Executable File Formats File System... -- Subject: Unit proc-sys-fs-binfmt_misc.mount has begun start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit proc-sys-fs-binfmt_misc.mount has begun starting up. Nov 13 16:35:54 managed-node01 systemd[1]: Mounted Arbitrary Executable File Formats File System. -- Subject: Unit proc-sys-fs-binfmt_misc.mount has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit proc-sys-fs-binfmt_misc.mount has finished starting up. -- -- The start-up result is done. Nov 13 16:35:54 managed-node01 kernel: nr_pdflush_threads exported in /proc is scheduled for removal Nov 13 16:35:59 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7160) Nov 13 16:36:04 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7155) Nov 13 16:36:09 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7150) Nov 13 16:36:13 managed-node01 sshd[3879]: Received disconnect from 10.31.14.245 port 40558:11: disconnected by user Nov 13 16:36:13 managed-node01 sshd[3879]: Disconnected from 10.31.14.245 port 40558 Nov 13 16:36:13 managed-node01 sshd[3879]: pam_unix(sshd:session): session closed for user root Nov 13 16:36:14 managed-node01 ansible-async_wrapper.py[5220]: 5221 still running (7145) Nov 13 16:36:14 managed-node01 sshd[11385]: Accepted publickey for root from 10.31.14.245 port 55024 ssh2: ECDSA SHA256:QRo2J9Rtsx+XPa157lxB8Uss34lEsivmmGqzs1GTYmg Nov 13 16:36:14 managed-node01 systemd[1]: Started Session 7 of user root. -- Subject: Unit session-7.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-7.scope has finished starting up. -- -- The start-up result is done. Nov 13 16:36:14 managed-node01 systemd-logind[540]: New session 7 of user root. -- Subject: A new session 7 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 7 has been created for the user root. -- -- The leading process of the session is 11385. Nov 13 16:36:14 managed-node01 sshd[11385]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 13 16:36:14 managed-node01 ansible-ansible.legacy.async_status[11879]: Invoked with jid=j175707545213.5217 mode=status _async_dir=/root/.ansible_async Nov 13 16:36:16 managed-node01 ansible-async_wrapper.py[5221]: Module complete (5221) Nov 13 16:36:19 managed-node01 ansible-async_wrapper.py[5220]: Done in kid B. Nov 13 16:36:19 managed-node01 systemd-logind[540]: Removed session 6. -- Subject: Session 6 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 6 has been terminated. Nov 13 16:37:13 managed-node01 sshd[11385]: Received disconnect from 10.31.14.245 port 55024:11: disconnected by user Nov 13 16:37:13 managed-node01 sshd[11385]: Disconnected from 10.31.14.245 port 55024 Nov 13 16:37:13 managed-node01 sshd[11385]: pam_unix(sshd:session): session closed for user root Nov 13 16:37:13 managed-node01 systemd-logind[540]: Removed session 7. -- Subject: Session 7 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 7 has been terminated. Nov 13 16:37:15 managed-node01 sshd[13487]: Accepted publickey for root from 10.31.14.245 port 56430 ssh2: ECDSA SHA256:QRo2J9Rtsx+XPa157lxB8Uss34lEsivmmGqzs1GTYmg Nov 13 16:37:15 managed-node01 systemd-logind[540]: New session 8 of user root. -- Subject: A new session 8 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 8 has been created for the user root. -- -- The leading process of the session is 13487. Nov 13 16:37:15 managed-node01 systemd[1]: Started Session 8 of user root. -- Subject: Unit session-8.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-8.scope has finished starting up. -- -- The start-up result is done. Nov 13 16:37:15 managed-node01 sshd[13487]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 13 16:37:15 managed-node01 ansible-ansible.legacy.async_status[13527]: Invoked with jid=j175707545213.5217 mode=status _async_dir=/root/.ansible_async Nov 13 16:37:15 managed-node01 ansible-ansible.legacy.async_status[13565]: Invoked with jid=j175707545213.5217 mode=cleanup _async_dir=/root/.ansible_async Nov 13 16:37:15 managed-node01 ansible-ansible.builtin.stat[13626]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.txt get_md5=False get_mime=True get_attributes=True Nov 13 16:37:16 managed-node01 ansible-ansible.builtin.slurp[13690]: Invoked with src=/var/log/leapp/leapp-report.txt Nov 13 16:37:16 managed-node01 ansible-ansible.builtin.slurp[13751]: Invoked with src=/var/log/leapp/leapp-report.json Nov 13 16:37:17 managed-node01 ansible-ansible.legacy.command[13812]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/\(inhibitor\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:17 managed-node01 ansible-ansible.legacy.command[13875]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/high \(error\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:17 managed-node01 ansible-ansible.builtin.stat[13937]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:37:18 managed-node01 ansible-ansible.builtin.lineinfile[14000]: Invoked with group=root insertbefore=None unsafe_writes=False selevel=None create=False seuser=None serole=None backrefs=False search_string=None state=present firstmatch=False mode=0644 insertafter=None path=/var/log/ripu/ripu.log owner=root regexp=None line=Job ended at 2025-11-13T21:37:18Z attributes=None backup=False validate=None setype=None Nov 13 16:37:18 managed-node01 ansible-ansible.builtin.slurp[14061]: Invoked with src=/var/log/ripu/ripu.log Nov 13 16:37:18 managed-node01 ansible-ansible.legacy.command[14123]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=export PATH=$PATH mv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251113T163455 removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:19 managed-node01 ansible-ansible.builtin.stat[14185]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.json get_md5=False get_mime=True get_attributes=True Nov 13 16:37:19 managed-node01 ansible-ansible.builtin.slurp[14248]: Invoked with src=/var/log/leapp/leapp-report.json Nov 13 16:37:20 managed-node01 ansible-ansible.builtin.stat[14370]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.json get_md5=False get_mime=True get_attributes=True Nov 13 16:37:21 managed-node01 ansible-ansible.builtin.slurp[14433]: Invoked with src=/var/log/leapp/leapp-report.json Nov 13 16:37:21 managed-node01 ansible-ansible.legacy.command[14495]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:22 managed-node01 ansible-ansible.legacy.command[14559]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="nest.test.redhat.com:/mnt/qa" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:22 managed-node01 ansible-ansible.legacy.command[14623]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="vtap-eng01.storage.rdu2.redhat.com:/vol/engarchive" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:22 managed-node01 ansible-ansible.legacy.command[14687]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="nest.test.redhat.com:/mnt/tpsdist" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:22 managed-node01 ansible-ansible.legacy.command[14752]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_engineering_nfs/devarchive/redhat/brewroot" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:23 managed-node01 ansible-ansible.legacy.command[14816]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail entry="ntap-bos-c01-eng01-nfs01b.storage.bos.redhat.com:/devops_brew_scratch_nfs/scratch" grep -qF "$entry" /etc/fstab && sed -i "s|^$entry|# $entry|" /etc/fstab removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:23 managed-node01 ansible-ansible.legacy.command[14880]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=dnf remove -y linux-firmware removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:24 managed-node01 ansible-ansible.legacy.command[14943]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=dnf install -y linux-firmware removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:37 managed-node01 NetworkManager[662]: [1763069857.9345] manager: kernel firmware directory '/lib/firmware' changed Nov 13 16:37:42 managed-node01 NetworkManager[662]: [1763069862.6778] manager: kernel firmware directory '/lib/firmware' changed Nov 13 16:37:47 managed-node01 NetworkManager[662]: [1763069867.3210] manager: kernel firmware directory '/lib/firmware' changed Nov 13 16:37:50 managed-node01 ansible-ansible.builtin.file[15031]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/ripu owner=root follow=True attributes=None mode=0755 Nov 13 16:37:50 managed-node01 ansible-ansible.builtin.stat[15092]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:37:51 managed-node01 ansible-ansible.legacy.stat[15153]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/ripu/ripu.log follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:37:51 managed-node01 ansible-ansible.legacy.copy[15200]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1763069870.912993-7566-171089605951032/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/ripu/ripu.log seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpa3n5kad2 serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=65aab0579db04fb77653b6f51363dac70bcd9a56 backup=False local_follow=None Nov 13 16:37:51 managed-node01 ansible-ansible.builtin.file[15261]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/ansible/facts.d owner=root follow=True attributes=None mode=0755 Nov 13 16:37:51 managed-node01 ansible-ansible.legacy.stat[15322]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/pre_ripu.fact follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:37:52 managed-node01 ansible-ansible.legacy.file[15354]: Invoked with force=False _original_basename=tmpivx_um1z owner=root follow=True group=root unsafe_writes=False serole=None state=file selevel=None setype=None dest=/etc/ansible/facts.d/pre_ripu.fact access_time=None access_time_format=%Y%m%d%H%M.%S modification_time=None path=/etc/ansible/facts.d/pre_ripu.fact src=None seuser=None recurse=False _diff_peek=None mode=0644 modification_time_format=%Y%m%d%H%M.%S attributes=None Nov 13 16:37:52 managed-node01 ansible-ansible.legacy.command[15415]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:37:52 managed-node01 ansible-ansible.legacy.stat[15482]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/non_rhel_packages.fact follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:37:53 managed-node01 ansible-ansible.legacy.file[15514]: Invoked with force=False _original_basename=tmp6oco33of owner=root follow=True group=root unsafe_writes=False serole=None state=file selevel=None setype=None dest=/etc/ansible/facts.d/non_rhel_packages.fact access_time=None access_time_format=%Y%m%d%H%M.%S modification_time=None path=/etc/ansible/facts.d/non_rhel_packages.fact src=None seuser=None recurse=False _diff_peek=None mode=0644 modification_time_format=%Y%m%d%H%M.%S attributes=None Nov 13 16:37:53 managed-node01 ansible-ansible.builtin.yum_repository[15575]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=rhel7_extras owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=RHEL 7 Server Extras retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['https://download.eng.brq.redhat.com/rhel-7/nightly/EXTRAS-7/latest-EXTRAS-7.9-RHEL-7/compose/Server/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-7-server-extras-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Nov 13 16:37:54 managed-node01 ansible-ansible.legacy.yum[15637]: Invoked with lock_timeout=30 update_cache=False conf_file=None exclude=[] allow_downgrade=False sslverify=True disable_gpg_check=False disable_excludes=None use_backend=auto validate_certs=True state=latest disablerepo=[] releasever=None skip_broken=False cacheonly=False autoremove=False download_dir=None installroot=/ install_weak_deps=True name=['leapp-upgrade'] download_only=False bugfix=False list=None install_repoquery=True update_only=False disable_plugin=[] enablerepo=['rhel-7-server-extras-rpms'] security=False enable_plugin=[] Nov 13 16:37:56 managed-node01 ansible-ansible.builtin.file[15708]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/leapp owner=root follow=True attributes=None mode=0700 Nov 13 16:37:56 managed-node01 ansible-ansible.legacy.stat[15770]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/leapp/answerfile follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:37:56 managed-node01 ansible-ansible.legacy.copy[15818]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1763069876.1757054-7684-110563907368503/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/leapp/answerfile seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpaun3w9cm serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=3d934ad808576e3a7fb4c14a89645a4ad55ccf53 backup=False local_follow=None Nov 13 16:37:56 managed-node01 ansible-ansible.builtin.file[15879]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=absent access_time_format=%Y%m%d%H%M.%S group=None modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/leapp/files/leapp_upgrade_repositories.repo owner=None follow=True attributes=None mode=None Nov 13 16:37:57 managed-node01 ansible-ansible.builtin.yum_repository[15940]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=/etc/leapp/files/leapp_upgrade_repositories owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=BaseOS for x86_64 retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/BaseOS/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-8-for-x86_64-baseos-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Nov 13 16:37:57 managed-node01 ansible-ansible.builtin.yum_repository[16001]: Invoked with metalink=None ip_resolve=None enabled=True proxy_password=NOT_LOGGING_PARAMETER mode=0644 mirrorlist_expire=None bandwidth=None cost=None file=/etc/leapp/files/leapp_upgrade_repositories owner=root exclude=None keepalive=None repo_gpgcheck=None group=root failovermethod=None unsafe_writes=False deltarpm_metadata_percentage=None gpgkey=None setype=None http_caching=None priority=None state=present mirrorlist=None params=None gpgcheck=False include=None sslcacert=None username=None metadata_expire=None description=AppStream for x86_64 retries=None selevel=None sslclientcert=None gpgcakey=None baseurl=['http://download.eng.brq.redhat.com/rhel-8/nightly/RHEL-8/latest-RHEL-8.10/compose/AppStream/x86_64/os/'] s3_enabled=None ssl_check_cert_permissions=None includepkgs=None async=None sslverify=None password=NOT_LOGGING_PARAMETER ui_repoid_vars=None protect=None serole=None throttle=None name=rhel-8-for-x86_64-appstream-rpms deltarpm_percentage=None sslclientkey=None seuser=None reposdir=/etc/yum.repos.d skip_if_unavailable=None module_hotfixes=None keepcache=None proxy_username=None timeout=None attributes=None metadata_expire_filter=None enablegroups=None proxy=None Nov 13 16:37:57 managed-node01 ansible-async_wrapper.py[16070]: Invoked with j369856111818 7200 /root/.ansible/tmp/ansible-tmp-1763069877.5532758-7730-157905647954943/AnsiballZ_command.py _ Nov 13 16:37:57 managed-node01 ansible-async_wrapper.py[16073]: Starting module and watcher Nov 13 16:37:57 managed-node01 ansible-async_wrapper.py[16073]: Start watching 16074 (7200) Nov 13 16:37:57 managed-node01 ansible-async_wrapper.py[16074]: Start module (16074) Nov 13 16:37:57 managed-node01 ansible-async_wrapper.py[16070]: Return async_wrapper task started. Nov 13 16:37:57 managed-node01 ansible-ansible.legacy.command[16075]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; ulimit -n 16384; leapp preupgrade --report-schema=1.2.0 --no-rhsm 2>&1 | tee -a /var/log/ripu/ripu.log removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:38:02 managed-node01 ansible-async_wrapper.py[16073]: 16074 still running (7200) Nov 13 16:38:07 managed-node01 ansible-async_wrapper.py[16073]: 16074 still running (7195) Nov 13 16:38:12 managed-node01 ansible-async_wrapper.py[16073]: 16074 still running (7190) Nov 13 16:38:17 managed-node01 ansible-async_wrapper.py[16073]: 16074 still running (7185) Nov 13 16:38:22 managed-node01 ansible-async_wrapper.py[16073]: 16074 still running (7180) Nov 13 16:38:27 managed-node01 ansible-async_wrapper.py[16073]: 16074 still running (7175) Nov 13 16:38:32 managed-node01 ansible-async_wrapper.py[16073]: 16074 still running (7170) Nov 13 16:38:37 managed-node01 ansible-async_wrapper.py[16074]: Module complete (16074) Nov 13 16:38:37 managed-node01 ansible-async_wrapper.py[16073]: Done in kid B. Nov 13 16:38:56 managed-node01 sshd[13487]: Received disconnect from 10.31.14.245 port 56430:11: disconnected by user Nov 13 16:38:56 managed-node01 sshd[13487]: Disconnected from 10.31.14.245 port 56430 Nov 13 16:38:56 managed-node01 sshd[13487]: pam_unix(sshd:session): session closed for user root Nov 13 16:38:57 managed-node01 systemd-logind[540]: Removed session 8. -- Subject: Session 8 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 8 has been terminated. Nov 13 16:38:57 managed-node01 sshd[24207]: Accepted publickey for root from 10.31.14.245 port 43270 ssh2: ECDSA SHA256:QRo2J9Rtsx+XPa157lxB8Uss34lEsivmmGqzs1GTYmg Nov 13 16:38:58 managed-node01 systemd[1]: Started Session 9 of user root. -- Subject: Unit session-9.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-9.scope has finished starting up. -- -- The start-up result is done. Nov 13 16:38:58 managed-node01 systemd-logind[540]: New session 9 of user root. -- Subject: A new session 9 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 9 has been created for the user root. -- -- The leading process of the session is 24207. Nov 13 16:38:58 managed-node01 sshd[24207]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 13 16:38:58 managed-node01 ansible-ansible.legacy.async_status[24269]: Invoked with jid=j369856111818.16070 mode=status _async_dir=/root/.ansible_async Nov 13 16:38:58 managed-node01 ansible-ansible.legacy.async_status[24307]: Invoked with jid=j369856111818.16070 mode=cleanup _async_dir=/root/.ansible_async Nov 13 16:38:58 managed-node01 ansible-ansible.builtin.stat[24368]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/leapp/leapp-report.txt get_md5=False get_mime=True get_attributes=True Nov 13 16:38:59 managed-node01 ansible-ansible.builtin.slurp[24432]: Invoked with src=/var/log/leapp/leapp-report.txt Nov 13 16:38:59 managed-node01 ansible-ansible.builtin.slurp[24493]: Invoked with src=/var/log/leapp/leapp-report.json Nov 13 16:39:00 managed-node01 ansible-ansible.legacy.command[24554]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/\(inhibitor\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:39:00 managed-node01 ansible-ansible.legacy.command[24616]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/high \(error\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:39:00 managed-node01 ansible-ansible.builtin.stat[24679]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:39:00 managed-node01 ansible-ansible.builtin.lineinfile[24742]: Invoked with group=root insertbefore=None unsafe_writes=False selevel=None create=False seuser=None serole=None backrefs=False search_string=None state=present firstmatch=False mode=0644 insertafter=None path=/var/log/ripu/ripu.log owner=root regexp=None line=Job ended at 2025-11-13T21:39:00Z attributes=None backup=False validate=None setype=None Nov 13 16:39:01 managed-node01 ansible-ansible.builtin.slurp[24803]: Invoked with src=/var/log/ripu/ripu.log Nov 13 16:39:01 managed-node01 ansible-ansible.legacy.command[24864]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=export PATH=$PATH mv /var/log/ripu/ripu.log /var/log/ripu/ripu.log-20251113T163455 removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:39:01 managed-node01 ansible-ansible.builtin.stat[24927]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:39:02 managed-node01 ansible-ansible.builtin.stat[24988]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:39:02 managed-node01 ansible-ansible.builtin.stat[25049]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:39:02 managed-node01 ansible-ansible.builtin.stat[25110]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:39:03 managed-node01 ansible-ansible.builtin.file[25172]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/var/log/ripu owner=root follow=True attributes=None mode=0755 Nov 13 16:39:03 managed-node01 ansible-ansible.builtin.stat[25233]: Invoked with checksum_algorithm=sha1 get_checksum=True follow=False path=/var/log/ripu/ripu.log get_md5=False get_mime=True get_attributes=True Nov 13 16:39:03 managed-node01 ansible-ansible.legacy.stat[25294]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/var/log/ripu/ripu.log follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:39:04 managed-node01 ansible-ansible.legacy.copy[25340]: Invoked with src=/root/.ansible/tmp/ansible-tmp-1763069943.6957443-8156-16497996390576/source directory_mode=None force=True attributes=None remote_src=None unsafe_writes=False dest=/var/log/ripu/ripu.log seuser=None setype=None group=root content=NOT_LOGGING_PARAMETER _original_basename=tmpswuw6gnd serole=None mode=0644 selevel=None owner=root follow=False validate=None checksum=68abde56ab0ff1823327ce375bd2dbf055d38843 backup=False local_follow=None Nov 13 16:39:04 managed-node01 ansible-ansible.builtin.file[25402]: Invoked with src=None selevel=None force=False setype=None _original_basename=None unsafe_writes=False access_time=None seuser=None recurse=False state=directory access_time_format=%Y%m%d%H%M.%S group=root modification_time=None serole=None _diff_peek=None modification_time_format=%Y%m%d%H%M.%S path=/etc/ansible/facts.d owner=root follow=True attributes=None mode=0755 Nov 13 16:39:04 managed-node01 ansible-ansible.legacy.stat[25463]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/pre_ripu.fact follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:39:04 managed-node01 ansible-ansible.legacy.file[25495]: Invoked with force=False _original_basename=tmpm9ex_18l owner=root follow=True group=root unsafe_writes=False serole=None state=file selevel=None setype=None dest=/etc/ansible/facts.d/pre_ripu.fact access_time=None access_time_format=%Y%m%d%H%M.%S modification_time=None path=/etc/ansible/facts.d/pre_ripu.fact src=None seuser=None recurse=False _diff_peek=None mode=0644 modification_time_format=%Y%m%d%H%M.%S attributes=None Nov 13 16:39:05 managed-node01 ansible-ansible.legacy.command[25556]: Invoked with executable=None _uses_shell=True strip_empty_ends=True _raw_params=set -o pipefail; export PATH=$PATH; rpm -qa | grep -ve '[\.|+]el7' | grep -vE '^(gpg-pubkey|libmodulemd|katello-ca-consumer)' | sort removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:39:05 managed-node01 ansible-ansible.legacy.stat[25623]: Invoked with checksum_algorithm=sha1 get_checksum=True path=/etc/ansible/facts.d/non_rhel_packages.fact follow=False get_md5=False get_mime=True get_attributes=True Nov 13 16:39:05 managed-node01 ansible-ansible.legacy.file[25655]: Invoked with force=False _original_basename=tmpiemnrhb1 owner=root follow=True group=root unsafe_writes=False serole=None state=file selevel=None setype=None dest=/etc/ansible/facts.d/non_rhel_packages.fact access_time=None access_time_format=%Y%m%d%H%M.%S modification_time=None path=/etc/ansible/facts.d/non_rhel_packages.fact src=None seuser=None recurse=False _diff_peek=None mode=0644 modification_time_format=%Y%m%d%H%M.%S attributes=None Nov 13 16:39:06 managed-node01 ansible-ansible.builtin.slurp[25716]: Invoked with src=/var/log/leapp/leapp-report.txt Nov 13 16:39:06 managed-node01 ansible-ansible.builtin.slurp[25777]: Invoked with src=/var/log/leapp/leapp-report.json Nov 13 16:39:07 managed-node01 ansible-ansible.legacy.command[25839]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/\(inhibitor\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:39:07 managed-node01 ansible-ansible.legacy.command[25901]: Invoked with executable=None _uses_shell=False strip_empty_ends=True _raw_params=awk '/high \(error\)/,/^-------/' /var/log/leapp/leapp-report.txt removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:39:07 managed-node01 ansible-ansible.legacy.command[25963]: Invoked with executable=/bin/bash _uses_shell=True strip_empty_ends=True _raw_params=set -euxo pipefail rm -f /var/log/leapp/leapp-upgrade.log rm -f /var/log/ripu/ripu.log* removes=None argv=None creates=None chdir=None stdin_add_newline=True stdin=None Nov 13 16:39:07 managed-node01 sshd[25976]: Accepted publickey for root from 10.31.14.245 port 57448 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Nov 13 16:39:08 managed-node01 systemd[1]: Started Session 10 of user root. -- Subject: Unit session-10.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-10.scope has finished starting up. -- -- The start-up result is done. Nov 13 16:39:08 managed-node01 systemd-logind[540]: New session 10 of user root. -- Subject: A new session 10 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 10 has been created for the user root. -- -- The leading process of the session is 25976. Nov 13 16:39:08 managed-node01 sshd[25976]: pam_unix(sshd:session): session opened for user root by (uid=0) Nov 13 16:39:08 managed-node01 sshd[25976]: Received disconnect from 10.31.14.245 port 57448:11: disconnected by user Nov 13 16:39:08 managed-node01 sshd[25976]: Disconnected from 10.31.14.245 port 57448 Nov 13 16:39:08 managed-node01 sshd[25976]: pam_unix(sshd:session): session closed for user root Nov 13 16:39:08 managed-node01 systemd-logind[540]: Removed session 10. -- Subject: Session 10 has been terminated -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A session with the ID 10 has been terminated. Nov 13 16:39:08 managed-node01 sshd[25989]: Accepted publickey for root from 10.31.14.245 port 57452 ssh2: RSA SHA256:9j1blwt3wcrRiGYZQ7ZGu9axm3cDklH6/z4c+Ee8CzE Nov 13 16:39:08 managed-node01 systemd[1]: Started Session 11 of user root. -- Subject: Unit session-11.scope has finished start-up -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- -- Unit session-11.scope has finished starting up. -- -- The start-up result is done. Nov 13 16:39:08 managed-node01 systemd-logind[540]: New session 11 of user root. -- Subject: A new session 11 has been created for user root -- Defined-By: systemd -- Support: http://lists.freedesktop.org/mailman/listinfo/systemd-devel -- Documentation: http://www.freedesktop.org/wiki/Software/systemd/multiseat -- -- A new session with the ID 11 has been created for the user root. -- -- The leading process of the session is 25989. Nov 13 16:39:08 managed-node01 sshd[25989]: pam_unix(sshd:session): session opened for user root by (uid=0)